Check: PHTN-67-000069
VMware vSphere 6.7 Photon OS STIG:
PHTN-67-000069
(in versions v1 r6 through v1 r1)
Title
The Photon operating system must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution. (Cat II impact)
Discussion
ASLR makes it more difficult for an attacker to predict the location of attack code he or she has introduced into a process's address space during an attempt at exploitation. Additionally, ASLR also makes it more difficult for an attacker to know the location of existing code to repurpose it using return-oriented programming techniques.
Check Content
At the command line, execute the following command: # cat /proc/sys/kernel/randomize_va_space If the value of "randomize_va_space" is not "2", this is a finding.
Fix Text
Open /etc/sysctl.d/50-security-hardening.conf with a text editor. Ensure that the "randomize_va_space" is uncommented and set to the following: kernel.randomize_va_space=2 At the command line, execute the following command: # sysctl --system
Additional Identifiers
Rule ID: SV-239140r856058_rule
Vulnerability ID: V-239140
Group Title: SRG-OS-000433-GPOS-00193
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002824 |
The information system implements organization-defined security safeguards to protect its memory from unauthorized code execution. |
Controls
Number | Title |
---|---|
SI-16 |
Memory Protection |