Check: GEN001180
Solaris 10 X86 STIG:
GEN001180
(in versions v2 r4 through v1 r17)
Title
All network services daemon files must have mode 0755 or less permissive. (Cat II impact)
Discussion
Restricting permission on daemons will protect them from unauthorized modification and possible system compromise.
Check Content
Check the mode of network services daemons. # ls -la /usr/bin /usr/sbin If the mode of a network services daemon is more permissive than 0755, this is a finding. NOTE: Network daemons not residing in these directories (such as httpd or sshd) must also be checked for the correct permissions. A way to locate network daemons, such as httpd and sshd, is with the ps command. # ps -ef | egrep '(sshd|httpd)'
Fix Text
Change the mode of the network services daemon. # chmod 0755 <path>
Additional Identifiers
Rule ID: SV-227613r854472_rule
Vulnerability ID: V-227613
Group Title: SRG-OS-000312
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002165 |
The information system enforces organization-defined discretionary access control policies over defined subjects and objects. |
Controls
Number | Title |
---|---|
AC-3 (4) |
Discretionary Access Control |