SYSTEM CHECK PROCEDURES

Transcription

SYSTEM CHECK PROCEDURES
4 SYSTEM CHECKS
Page 1
3. SYSTEM CHECK PROCEDURES
This section details the procedures to perform for manual UNIX system Security checks. Reviewers should use
the UNIX Scripts whenever possible. Manual checks are provided in the event that the scripts are either
unavailable to examine an item, return false negatives, return false positives, or will not execute on the system.
The check procedures in this document now contain Global Information Grid-Bandwidth Expansion (GIG-BE)
information to identify the MAC level, IA Control identifiers, and Department of Defense (DOD) description of
the IA Control. Many contain more than one pertinent IA Control. These are listed to the far right of the PDI
number within the identification block.
Each identification block also contains one of six codes to indicate the automation status of each PDI. These
may change from time to time, such as a script that is initially manual for an IAVA but is automated at a later
time. Scripts are either MAN+ /+ or PART because there is either information needed before they can be
automated, the attempts to automate them have proven to produce false positives/negatives, or just perform the
service adequately using current methods. The codes are:
AUTO
Indicates completely automated scripts.
PART
Indicates partially automated scripts.
PART+
Indicates partially automated scripts that we could fully automate.
MAN
Indicates scripts requiring manual reviews.
MAN+
MAN++
Indicates manual review scripts we could partially automate.
Indicates manual review scripts we could fully automate.
This page is intentionally left blank.
TABLE OF CONTENTS
Page
3
3.1
3.1.1
SYSTEM CHECK PROCEDURES
UNIX Overview and Site Information
System Equipement
3.1.1.1
GEN000020 – Single User Mode Password
3.1.1.2
GEN000040 – Single User Mode Password Incompatibility Documentation
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
3.1.1.3
GEN000060 – Single User Mode Password Incompatibility Location
3.1.1.4
GEN000080 – System Equipment Location
3.1.2
Operating System
3.1.2.1
GEN000100 – Supported Release
3.1.2.2
GEN000120 – Vendor Recommended and Security Patches
3.1.3
File Integrity
3.1.3.1
GEN000140 – Create and Maintain System Baseline
3.1.3.2
GEN000160 – System Baseline Backup on Write-protected Media
3.1.3.3
GEN000220 – System Baseline for System Libraries and Binaries Checking
3.1.3.4
GEN000240 – Network Time-Server
3.2
3.2.1
DISCRETIONARY ACCESS CONTROL AND GENERAL SECURITY
User Account Controls
3.2.1.1
GEN000260 – Shared Account Documentation
3.2.1.2
GEN000280 – Shared Account Direct Logon
3.2.2
Interactive Users
3.2.2.1
GEN000300 – Unique Account Name
3.2.2.2
GEN000320 – Unique UID
3.2.2.3
GEN000340 – Reserved System Account UIDs
3.2.2.4
GEN000360 – Reserved System Account GIDs
3.2.2.5
GEN000380 – Groups Referenced in /etc/passwd
3.2.3
Logon Warning Banner
3.2.3.1
GEN000400 – Logon Warning Banner Display
3.2.3.2
GEN000420 – Logon Warning Banner Content
3.2.4
Account Access
3.2.4.1
GEN000440 – Logging Login Attempts
3.2.4.2
GEN000460 – Three Failed Login Attempts
3.2.4.3
GEN000480 – Login Delay
3.2.5
Inactivity Timeout/Locking
3.2.5.1
GEN000500 – Inactivity
3.2.5.2
GEN000520 – Continuous Display
3.2.6
Page 2
Password Guidelines
3.2.6.1
GEN000540 – Password Change 24 Hours
3.2.6.2
GEN000560 – Password Protect Enabled Accounts
3.2.6.3
GEN000580 – Password Length
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 3
3.2.6.4
GEN000600 – Password Character Mix
3.2.6.5
GEN000620 – Password Character Mix
3.2.6.6
GEN000640 – Password Character Mix
3.2.6.7
GEN000660 – Password Contents
3.2.6.8
GEN000680 – Password Contents
3.2.6.9
GEN000700 – Password Change Every 60 Days
3.2.6.10
GEN000740 – Password Change Every Year
3.2.6.11
GEN000760 – Inactive Accounts are not locked
3.2.6.12
GEN000780 – Easily Guessed Passwords
3.2.6.13
GEN000800 – Password Reuse
3.2.6.14
GEN000820 – Global Password Configuration Files
3.2.6.15
GEN000840 – Root Account Access
3.2.6.16
GEN000860 – Password Change for Administrative Passwords Upon SA Reassignment
3.2.7
Root Account
3.2.7.1
GEN000880 – Root’s UID
3.2.7.2
GEN000900 – Root’s Home Directory
3.2.7.3
GEN000920 – Root’s Home Directory Permissions
3.2.7.4
GEN000940 – Root’s Search Path
3.2.7.5
GEN000960 – Root’s Search Path
3.2.7.6
GEN000980 – Root Console Access
3.2.7.7
GEN001000 – Remote Consoles
3.2.7.8
GEN001020 – Direct Root Login
3.2.7.9
GEN001060 – Log Root Access Attempts
3.2.7.10
3.2.8
GEN001080 – Root Shell
Encrypted Root Access
3.2.8.1
GEN001100 – Encrypting Root Access
3.2.8.2
GEN001120 – Encrypting Root Access
3.2.9
File and Directory Controls
3.2.9.1
GEN001140 – Uneven File Permissions
3.2.9.2
GEN001160 – Unowned Files
3.2.9.3
GEN001180 – Network Services Daemon Permissions
3.2.9.4
GEN001200 – System Command Permissions
3.2.9.5
GEN001220 – System Files, Programs, and Directories Ownership
3.2.9.6
GEN001240 – System Files, Programs, and Directories Group Ownership
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
3.2.9.7
GEN001260 – System Log File Permissions
3.2.9.8
GEN001280 – Manual Page File Permissions
3.2.9.9
GEN001300 – Library File Permissions
3.2.9.10
GEN001320 – NIS/NIS+/yp File Ownership
3.2.9.11
GEN001340 – NIS/NIS+/yp File Group Ownership
3.2.9.12
GEN001360 – NIS/NIS+/yp File Permissions
3.2.9.13
GEN001380 – /etc/passwd File Permissions
3.2.9.14
GEN001400 – /etc/passwd and/or /etc/shadow File Ownership
3.2.9.15
GEN001420 – /etc/shadow File Permissions
3.2.10
Home Directories
3.2.10.1
GEN001440 – Assign Home Directories
3.2.10.2
GEN001460 – Assigned Home Directories Exist
3.2.10.3
GEN001480 –Home Directories Permissions
3.2.10.4
GEN001500 –Home Directories Ownership
3.2.10.5
GEN001520 –Home Directories Group Ownership
3.2.11
User Files
3.2.11.1
GEN001540 –Home Directories File Ownership
3.2.11.2
GEN001560 – Home Directories File Permissions
3.2.12
Run Control Scripts
3.2.12.1
GEN001580 – Run Control Scripts Permissions
3.2.12.2
GEN001600 – Run Control Scripts PATH Variable
3.2.12.3
GEN001620 – Run Control Scripts SGID/SUID
3.2.12.4
GEN001640 – Run Control Scripts World Writable Programs or Scripts
3.2.12.5
GEN001660 – Run Control Scripts Ownership
3.2.12.6
GEN001680 – Run Control Scripts Group Ownership
3.2.12.7
GEN001700 – Run Control Scripts Execute Programs
3.2.13
Page 4
Global Initialization Files
3.2.13.1
GEN001720 – Global Initialization Files Permissions
3.2.13.2
GEN001740 – Global Initialization Files Ownership
3.2.13.3
GEN001760 – Global Initialization Files Group Ownership
3.2.13.4
GEN001780 – Global Initialization Files do not Contain mesg -n
3.2.13.5
GEN001800 – Default/Skeleton Dot Files Permissions
3.2.13.6
GEN001820 – Default/Skeleton Dot Files Ownership
3.2.13.7
GEN001840 – Global Initialization Files PATH Variable
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
3.2.14
Page 5
Local Initialization Files
3.2.14.1
GEN001860 – Local Initialization Files Ownership
3.2.14.2
GEN001880 – Local Initialization Files Permissions
3.2.14.3
GEN001900 – Local Initialization Files PATH Variable
3.2.14.4
GEN001920 – Local Initialization Files SGID/SUID
3.2.14.5
GEN001940 – Local Initialization Files World Writable Programs or Scripts
3.2.14.6
GEN001960 – Local Initialization Files mesg -y
3.2.15
Trusted System/System Access Control Files
3.2.15.1
GEN001980 – Plus (+) in Access Control Files
3.2.15.2
GEN002000 – The .netrc File Exists
3.2.15.3
GEN002020 – Access Control Files Host Pairs
3.2.15.4
GEN002040 – Access Control Files Documentation
3.2.15.5
GEN002060 – Access Control Files Accessibility
3.2.15.6
GEN002100 – The .rhosts Supported in PAM
3.2.16
Shells
3.2.16.1
GEN002120 – The /etc/shells File Does Not Exist
3.2.16.2
GEN002140 – The /etc/shells Contents
3.2.16.3
GEN002160 – Shells SUID
3.2.16.4
GEN002180 – Shells SGID
3.2.16.5
GEN002200 – Shells Ownership
3.2.16.6
GEN002220 – Shells Permissions
3.2.17
Device Files
3.2.17.1
GEN002260 – System Baseline for Device Files Checking
3.2.17.2
GEN002280 – Device Files Directories Permissions
3.2.17.3
GEN002300 – Device Files Ownership
3.2.17.4
GEN002320 – Audio Device Permissions
3.2.17.5
GEN002340 – Audio Device Ownership
3.2.17.6
GEN002360 – Audio Device Group Ownership
3.2.18
Set User ID (suid)
3.2.18.1
GEN002380 – SUID Files Baseline
3.2.18.2
GEN002400 – System Baseline for SUID Files Checkling
3.2.18.3
GEN002420 – File Systems Mounted With nosuid
3.2.19
3.2.19.1
Set Group ID (sgid)
GEN002440 – SGID Files Baseline
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
3.2.19.2
3.2.20
GEN002460 – System Baseline for SGID Files Checking
Sticky Bit
3.2.20.1
GEN002480 – World Writable Files and Directories
3.2.20.2
GEN002500 – Sticky Bit on Public Directories
3.2.20.3
GEN002520 – Public Directories Ownership
3.2.20.4
GEN002540 – Public Directories Group Ownership
3.2.21
Umask
3.2.21.1
GEN002560 – Default umask
3.2.21.2
GEN002580 – Permissive umask Documentation
3.2.22
3.2.22.1
3.2.23
3.2.23.1
3.2.24
Page 6
Development Systems
GEN002600 – Development Systems Security Requirements
Default Accounts
GEN002640 – Disabled Default System Accounts
Audit Requirements
3.2.24.1
GEN002660 – Configure and Implement Auditing
3.2.24.2
GEN002680 – Audit Logs Accessiblity
3.2.24.3
GEN002700 – Audit Logs Permissions
3.2.24.4
GEN002720 – Audit Failed File and Program Access Attempts
3.2.24.5
GEN002740 – Audit File and Program Deletion
3.2.24.6
GEN002760 – Audit Administrative, Privileged, and Security Actions
3.2.24.7
GEN002800 – Audit Login, Logout, and Session Initiation
3.2.24.8
GEN002820 – Audit Discretionary Access Control Permission Modifications
3.2.24.9
GEN002860 – Audit Logs Rotation
3.2.24.10
GEN002900 – Audit Data Retention
3.2.24.11
GEN002920 – Audit Data Backup
3.2.25
3.2.25.1
3.2.26
Audit Review Guidance
GEN002940 – Audit Logs Review
Cron Restrictions
3.2.26.1
GEN002960 – Cron Utility Accessibility
3.2.26.2
GEN002980 – The cron.allow Permissions
3.2.26.3
GEN003000 – Cron Executes World Writable Programs
3.2.26.4
GEN003020 – Cron Executes Programs in World Writable Directories
3.2.26.5
GEN003040 – Crontabs Ownership
3.2.26.6
GEN003060 – Default System Accounts and Cron
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
3.2.26.7
GEN003080 – Crontab files Permissions
3.2.26.8
GEN003100 – Cron and Crontab Directories Permissions
3.2.26.9
GEN003120 – Cron and Crontab Directories Ownership
3.2.26.10
GEN003140 – Cron and Crontab Directories Group Ownership
3.2.26.11
GEN003160 – Cron Logging
3.2.26.12
GEN003180 – Cronlog Permissions
3.2.26.13
GEN003200 – cron.deny Permissions
3.2.26.14
GEN003220 – Cron Programs umask
3.2.26.15
GEN003240 – cron.allow Ownership
3.2.26.16
GEN003260 – cron.deny Ownership
3.2.27
At Restrictions
3.2.27.1
GEN003280 – At Utility Accessibility
3.2.27.2
GEN003300 – The at.deny File
3.2.27.3
GEN003320 – Default System Accounts and At
3.2.27.4
GEN003340 – at.allow and at.deny Permissions
3.2.27.5
GEN003360 – At Executes World Writable Programs
3.2.27.6
GEN003380 – At Executes Programs in World Writable Directories
3.2.27.7
GEN003400 – The at Directory Permissions
3.2.27.8
GEN003420 – The at Directory Ownership
3.2.27.9
GEN003440 – At Programs umask
3.2.27.10
GEN003460 – at.allow Ownership
3.2.27.11
GEN003480 – at.deny Ownership
3.2.28
Restrict/Disable Core Dumps
3.2.28.1
GEN003500 – Restrict or Disable Core Dumps
3.2.28.2
GEN003520 – Core Dump Directory Ownership and Permissions
3.2.29
3.2.29.1
Disable Executable Stack
GEN003540 – Disable Executable Stack
3.2.30
Restrict NFS Port Listening
3.2.31
Use More Random TCP Sequence Numbers
3.2.31.1
3.2.32
3.2.32.1
3.2.33
3.2.33.1
Page 7
GEN003580 – TCP Sequence Numbers
Network Security Settings
GEN003600 – Network Security Settings
File Systems
GEN003620 – Separate Filesytem Partitions
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
3.2.33.2
GEN003640 – Root Filesystem Logging
3.2.34
Syslog AUTH/AUTHPRIV Facility
3.2.34.1
3.3
3.3.1
GEN003660 – Authentication Data Logging
Network Services
Network Services
3.3.1.1
GEN003680 – Required Network Services For Operation
3.3.1.2
GEN003700 – Disable inetd/xinetd
3.3.1.3
GEN003720 – inetd.conf Ownership
3.3.1.4
GEN003740 – inetd.conf Permissions
3.3.1.5
GEN003760 – The Services File Ownership
3.3.1.6
GEN003780 – The Services File Permissions
3.3.1.7
GEN003800 – inetd Logging
3.3.2
3.3.2.1
3.3.3
3.3.3.1
3.3.4
Rlogin and rsh
GEN003820 – Remote Login or Shell Is Enabled
Rexec
GEN003840 – The rexec Service Is Enabled
Finger
3.3.4.1
GEN003860 – The finger Service Is Enabled
3.3.4.2
GEN003865 – Network analysis tools enabled.
3.3.5
Remote Host Printing
3.3.5.1
GEN003880 – Print Server and Client Configuration Documentation
3.3.5.2
GEN003900 – hosts.lpd Contents
3.3.5.3
GEN003920 – hosts.lpd Ownership
3.3.5.4
GEN003940 – hosts.lpd Permissions
3.3.6
Traceroute
3.3.6.1
GEN003960 – The traceroute Command Ownership
3.3.6.2
GEN003980 – The traceroute Command Group Ownership
3.3.6.3
GEN004000 – The traceroute Command Permissions
3.3.7
Page 8
Client Browser Requirements
3.3.7.1
GEN004020 – Browser Capable of 128-bit Encryption
3.3.7.2
GEN004040 – Browser Software Update Feature
3.3.7.3
GEN004060 – Browser Unencrypted Secure Content Caching
3.3.7.4
GEN004100 – Browser Allows Active Scripting
3.3.7.5
GEN004120 – Browser Data Redirection Warning
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
3.3.7.6
GEN004160 – Browser Certificate Warning
3.3.7.7
GEN004180 – Browser Home Page
3.3.7.8
GEN004200 – Browser SSL Configuration
3.3.7.9
GEN004220 – The root Account’s Browser
3.3.7.10
GEN004240 – Browser Version
3.3.7.11
GEN004260 – Browser Cookie Warning
3.3.7.12
GEN004280 – Browser Form Data Warning
3.3.7.13
GEN004300 – Browser Secure and Non-secure Content Warning
3.3.7.14
GEN004320 – Browser Leaving Encrypted Site Warning
3.3.8
Sendmail or Equivalent
3.3.8.1
GEN004360 – aliases Ownership
3.3.8.2
GEN004380 – aliases Permissions
3.3.8.3
GEN004400 – File Executed Through Aliases Accessibility
3.3.8.4
GEN004420 – File Executed Through Aliases Permissions
3.3.8.5
GEN004440 – Sendmail Logging
3.3.8.6
GEN004460 – Critical Level Sendmail Messages Logging
3.3.8.7
GEN004480 – Critical Sendmail Log File Ownership
3.3.8.8
GEN004500 – Critical Sendmail Log File Permissions
3.3.8.9
GEN004540 – Sendmail Help Command
3.3.8.10
GEN004560 – Sendmail Greeting to Mask Version
3.3.8.11
GEN004580 – .forward Files
3.3.8.12
GEN004600 – Sendmail Version
3.3.8.13
GEN004620 – Sendmail DEBUG Command
3.3.8.14
GEN004640 – Sendmail DECODE Command
3.3.8.15
GEN004660 – Sendmail EXPN Command
3.3.8.16
GEN004680 – Sendmail VRFY Command
3.3.8.17
GEN004700 – Sendmail WIZ Command
3.3.9
Page 9
File Transfer Protocol (FTP) and Telnet
3.3.9.1
GEN004720 – FTP or Telnet Within Enclave Behind Router
3.3.9.2
GEN004760 – FTP or Telnet Outside to Inside Enclave
3.3.9.3
GEN004780 – FTP or Telnet Userids and Passwords
3.3.9.4
GEN004800 – Unencrypted FTP or Telnet
3.3.9.5
GEN004820 – Anonymous FTP
3.3.9.6
GEN004840 – Anonymous FTP Segregation into DMZ
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
3.3.10
FTP Configuration
3.3.10.1
GEN004880 – The ftpusers File
3.3.10.2
GEN004900 – The ftpusers File Contents
3.3.10.3
GEN004920 – The ftpusers File Ownership
3.3.10.4
GEN004940 – The ftpusers File Permissions
3.3.10.5
GEN004980 – FTP Daemon Logging
3.3.10.6
GEN005000 – Anonymous FTP Account Shell
3.3.10.7
GEN005020 – Anonymous FTP Configuration
3.3.10.8
GEN005040 – FTP User’s umask
3.3.11
3.3.11.1
File Service Protocol (FSP)
GEN005060 – FSP Is Enabled
3.3.12
Trivial File Transfer Protocol (TFTP)
3.3.12.1
GEN005080 – TFTP Secure Mode
3.3.12.2
GEN005100 – TFTP SUID/SGID Bit
3.3.12.3
GEN005120 – TFTP Configuration
3.3.12.4
GEN005140 – TFTP Documentation
3.3.13
X Window System
3.3.13.1
GEN005160 – .Xauthority Files
3.3.13.2
GEN005180 – .Xauthority File Permissions
3.3.13.3
GEN005200 – X Displays Exporting
3.3.13.4
GEN005220 – X Client Authorization via X*.hosts
3.3.13.5
GEN005240 – X Client Authorization
3.3.13.6
GEN005260 – X Window System Not Required and Not Disabled
3.3.14
3.3.14.1
3.3.15
UNIX to UNIX Copy Program (UUCP)
GEN005280 – Disable UUCP
Simple Network Management Protocol (SNMP)
3.3.15.1
GEN005300 – Changed SNMP Community Strings
3.3.15.2
GEN005320 – snmpd.conf Permissions
3.3.15.3
GEN005340 – MIB File Permissions
3.3.15.4
GEN005360 – snmpd.conf and .mib Ownership
3.3.15.5
GEN005380 – Dedicated Hardware for SNMP
3.3.16
Page 10
System Logging Daemon
3.3.16.1
GEN005400 – /etc/syslog.conf Assessiblity
3.3.16.2
GEN005420 – /etc/syslog.conf Group Ownership
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
3.3.16.3
GEN005440 – Local Loghosts
3.3.16.4
GEN005460 – Remote Loghost Documentation
3.3.16.5
GEN005480 – Syslog Accepts Remote Messages
3.3.17
Secure Shell (SSH) and Equivalents
3.3.17.1
GEN005500 – SSH Version 1 Compatibility
3.3.17.2
GEN005540 – Encrypted Communications IP Filtering and Banners
3.3.18
UNIX Routing Vulnerabilities
3.3.18.1
GEN005560 – Default Gateway
3.3.18.2
GEN005580 – Dedicated Hardware for Routing
3.3.18.3
GEN005600 – Disable IP Forwarding
3.3.19
3.3.19.1
3.3.20
3.3.20.1
3.3.21
3.3.21.1
3.3.22
3.3.22.1
3.3.23
3.3.23.1
3.3.24
Lotus Domino Web Application
GEN005620 – Lotus Domino Version
Squid Web Proxy Authentication Header
GEN005640 – Squid Web Proxy Authentication Header Vulnerability
Squid Web Proxy MSNT Auth Helper
GEN005660 – Squid Web Proxy MSNT Auth Helper Vulnerability
Squid Web Proxy Version
GEN005680 – Squid Web Proxy Version
iPlanet Web Server
GEN005700 – iPlanet Web Server NS-query-pat Vulnerability
Network Filesytem (NFS)
3.3.24.1
GEN005720 – NFS Port Monitoring
3.3.24.2
GEN005740 – Export Configuration File Ownership
3.3.24.3
GEN005760 – Export Configuration File Permissions
3.3.24.4
GEN005780 – Writable Exported File Systems Documentation
3.3.24.5
GEN005800 – Exported System Files and Directories Ownership
3.3.24.6
GEN005820 – Deny NFS Client Access Without Userid
3.3.24.7
GEN005840 – Restrict NFS Filesystem Access to Local Hosts
3.3.24.8
GEN005860 – NFS User Authentication
3.3.24.9
GEN005880 – Root Access Option Documentation
3.3.24.10
3.3.25
3.3.25.1
3.3.26
Page 11
GEN005900 – NFS Clients Enable nosuid and nosgid
Instant Messaging (IM)
GEN006000 – Public Instant Messaging Client is Installed
Peer-to-Peer File-Sharing Utilities and Clients
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
3.3.26.1
GEN006040 – Peer-to-Peer Application Authorization with DAA
3.3.27
Samba
3.3.27.1
GEN006060 – Samba is Enabled
3.3.27.2
GEN006080 – Samba Web Administration with SSH Port Forwarding
3.3.27.3
GEN006100 – smb.conf Ownership
3.3.27.4
GEN006120 – smb.conf Group Ownership
3.3.27.5
GEN006140 – smb.conf Permissions
3.3.27.6
GEN006160 – smbpasswd Ownership
3.3.27.7
GEN006180 – smbpasswd Group Ownership
3.3.27.8
GEN006200 – smbpasswd Permissions
3.3.27.9
GEN006220 – smb.conf Configuration
3.3.28
Internet Network News (INN)
3.3.28.1
GEN006240 – INN Documentation
3.3.28.2
GEN006260 – /etc/news/hosts.nntp Permissions
3.3.28.3
GEN006280 – /etc/news/hosts.nntp.nolimit Permissions
3.3.28.4
GEN006300 – /etc/news/nnrp.access Permissions
3.3.28.5
GEN006320 – /etc/news/passwd.nntp Permissions
3.3.28.6
GEN006340 – /etc/news Files Ownership
3.3.28.7
GEN006360 – /etc/news Files Group Ownership
3.4
3.4.1
Network Based Authentication
Network Information Service (NIS)
3.4.1.1
GEN006380 – NIS/NIS+ Implemented Under UDP
3.4.1.2
GEN006400 – NIS Documentation
3.4.1.3
GEN006420 – NIS Maps Domain Names
3.4.2
Network Information Service Plus (NIS+)
3.4.2.1
GEN006440 – NIS Used as Opposed to NIS+
3.4.2.2
GEN006460 – NIS+ Server at Security Level 2
3.5
3.5.1
UNIX Security Tools
UNIX Security Tools
3.5.1.1
GEN006480 – Host-Based Intrusion Detection Tool
3.5.1.2
GEN006540 – System Vulnerabiltiy Assessment Tool
3.5.1.3
GEN006560 – Security Tool Notifications
3.5.2
3.5.2.1
Page 12
Access Control Programs and TCP_WRAPPERS
GEN006580 – Access Control Program
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
3.5.2.2
GEN006600 – Access Control Program Logging
3.5.2.3
GEN006620 – Access Control Program Control System Access
3.5.2.4
GEN006640 – Virus Protection Software
3.6
Page 13
3.6.1
SUN SOLARIS
3.6.1.1
3.6.2
Removable Media
SOL00020 – /etc/rmmount.conf Configuration
The audit_user File
3.6.2.1
SOL00040 – audit_user User Auditing Levels
3.6.2.2
SOL00060 – audit_user Ownership
3.6.2.3
SOL00080 – audit_user Group Ownership
3.6.2.4
SOL00100 – audit_user Permissions
3.6.3
3.6.3.1
3.6.4
3.6.4.1
3.6.5
Automated Security Enhancement Tool (ASET)
SOL00120 – Aset Master Files Location
The uid_aliases File
SOL00140 – /usr/asset/masters/uid_aliases Content
The asetenv File
3.6.5.1
SOL00160 – ASET Used on a Firewall
3.6.5.2
SOL00180 – ASET Environment Variables
3.6.6
Running ASET
3.6.6.1
SOL00200 – NIS+ and YPCHECK
3.6.6.2
SOL00220 – /usr/aset/userlist Content
3.6.6.3
SOL00240 – /usr/asset/userlist Ownership
3.6.6.4
SOL00260 – /usr/asset/userlist Permissions
3.6.7
3.6.7.1
3.6.8
Electrically Erasable Programmable Read-only Memory (EEPROM)
SOL00300 – EEPROM security-mode Parameter
Sun Answerbook2
3.6.8.1
SOL00360 – Sun Answerbook2 Script Access
3.6.8.2
SOL00380 – Sun Answerbook2 dwhttpd Format String
3.6.9
3.6.9.1
3.6.10
3.6.10.1
3.6.11
3.6.11.1
NFS Server Logging
SOL00400 – NFS Server Logging
Extended File Attributes
SOL00420 – Hidden Extended File Attributes
Root Default Group
SOL00440 – Group Account with gid of 0
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
3.7
HEWLETT PACKARD UNIX (HP-UX)
3.7.1
Trusted Mode
3.7.1.1
HPUX0020 – Operating in Trusted Mode
3.7.2
Trusted System Auditing
3.7.2.1
HPUX0040 – AUDMON_ARGS Flag Configuration
3.7.3
The /etc/securetty File
3.7.3.1
HPUX0060 – /etc/securetty Ownership
3.7.3.2
HPUX0080 – / etc/securetty Group Owner
3.7.3.3
HPUX0100 – /etc/securetty Permissions
3.8
IBM ADVANCED INTERACTIVE EXECUTIVE (AIX)
3.8.1
Security Structure
3.8.1.1
AIX00020 – TCB Software
3.8.2
Network Security
3.8.2.1
AIX00040 – securetcpip Command
3.8.3
System Commands
3.8.3.1
AIX00060 – System Baseline for Files with TCB Bit Set
3.8.4
Authentication
3.8.4.1
AIX00080 – SYSTEM Attribute
3.9
SILICON GRAPHICS (SGI) IRIX
3.10
3.10.1.1
3.11
3.11.1
3.11.1.1
3.11.2
3.11.2.1
3.11.3
Xfsmd
IRIX0020 – The xmfsmd Service is Enabled
LINUX
System BIOS Configuration
LNX00040 – Disable Boot From Removable Media
Restricting the Boot Process
LNX00060 – Password Configuration Table Configuration
Boot Loaders
3.11.3.1
LNX00080 – Boot Diskette
3.11.3.2
LNX00100 – Default Boot Loader
3.11.3.3
LNX00120 – /boot Partition
3.11.4
Password Protecting the GRUB Console Boot Loader
3.11.4.1
LNX00140 – GRUB Boot Loader Encrypted Password
3.11.4.2
LNX00160 – grub.conf Permissions
3.11.5
Page 14
Password Protecting the LILO Boot Loader
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
3.11.5.1
LNX00180 – LILO Global Password
3.11.5.2
LNX00200 – LILO Boot Loader Encrypted Password
3.11.5.3
LNX00220 – /etc/lilo.conf Permissions
3.11.6
3.11.6.1
3.11.7
3.11.7.1
3.11.8
3.11.8.1
3.11.9
3.11.9.1
3.11.10
Filesystems
LNX00240 – Journaling
Red Hat Kickstart and SuSE AutoYaST
LNX00260 – Kickstart or AutoYaST
Dual Boot
LNX00280 – Capable of Dual Boot
Ugidd RPC Daemon
LNX00300 – The rpc.ugidd Daemon is Enabled
Default Accounts
3.11.10.1
LNX00320 – Special Privileged Accounts
3.11.10.2
LNX00340 – Unnecessary Accounts
3.11.11
X Windows
3.11.11.1
LNX00360 – X Server Options Enabled
3.11.11.2
LNX00380 – X Server Options Not Enabled
3.11.12
Console Access
3.11.12.1
LNX00400 – Access File Ownership
3.11.12.2
LNX00420 – Access File Group Ownership
3.11.12.3
LNX00440 – Access File Permissions
3.11.13
Kernel Configuration File
3.11.13.1
LNX00480 – /etc/sysctl.conf Ownership
3.11.13.2
LNX00500 – /etc/sysctl.conf Group Ownership
3.11.13.3
LNX00520 – / etc/sysctl.conf Permissions
3.11.14
NFS Server
3.11.14.1
LNX00540 – The insecure Option
3.11.14.2
LNX00560 – The insecure_locks Option
3.11.15
3.11.15.1
3.11.16
3.11.16.1
3.11.17
3.11.17.1
Page 15
The /etc/inittab File
LNX00580 – Ctrl-Alt-Delete Sequence
Administrative Controls
LNX00600 – PAM Configuration
The /etc/securetty File
LNX00620 – /etc/securetty Group Ownership
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
3.11.17.2
LNX00640 – /etc/securetty Ownership
3.11.17.3
LNX00660 – /etc/securetty Permissions
3.11.18
RealPlayer
3.11.18.1
3.12
Page 16
LNX00680 – RealPlayer Version
Information Assurance Vulnerability Management (IAVM)
3.12.1
IAVA0005 – 2001-A-0011 Format String Vulnerability in CDE ToolTalk
3.12.2
IAVA0010 – 1999-0002 TCP Wrappers Trojan Vulnerability
3.12.3
IAVA0015 – 98-06 Qpopper Vulnerability
3.12.4
IAVA0020 – 1998-A-0011 General Internet Message Access Protocol
3.12.5
IAVA0025 – 98-07 Buffer Overflow in Mail and News Clients
3.12.6
IAVA0030 – 2000-A-0003 Gauntlet Firewall Buffer Overflow
3.12.7
IAVA0035 – 2001-T-0004 MySQLd Vulnerability
3.12.8
IAVA0040 – 2001-A-0007 iPlanet
3.12.9
IAVA0045 – 2001-T-0008 BSD Telnet Daemon
3.12.10
IAVA0050 – 2004-B-0015 – Sun JRE Bypass Vulnerability
3.12.11
IAVA0055 – 2001-B-0002 HP OpenView and Tivoli NetView
3.12.12
IAVA0060 – 2004-T-0038 – Sun Remote Denial of Service
3.12.13
IAVA0065 – 2001-A-0013 SSH V1
3.12.14
IAVA0075 – 2001-A-0009 Gauntlet SMAP/SMAPD Buffer Overflow
3.12.15
IAVA0080 – 2001-T-0017 OpenSSH
3.12.16
IAVA0085 – 2005-A-0014 Oracle E-Business Suite Vulnerabilities
3.12.17
IAVA0090 – 2002-A-0001 CDE Buffer Overflow
3.12.18
IAVA0095 – 2001-T-0015 LPD Vulnerabilities
3.12.19
IAVA0100 – 2005-T-0014 Multiple Vulnerabilities in Mozilla Firefox
3.12.20
IAVA0105 – 2001-A-0014 Login Daemon
3.12.21
IAVA0110 – 2005-B-0012 PAWS DoS Vulnerability
3.12.22
IAVA0115 – 2002-A-SNMP-0002, 2002-A-SNMP-003 SNMP
3.12.23
IAVA0120 – 2005-A-0005 Multiple Vulnerabilities in BIND
3.12.24
IAVA0125 – 2001-T-0018 SSH Short Password Vulnerability
3.12.25
IAVA0135 – 2001-B-0004 WU-FTPD
3.12.26
IAVA0140 – 2005-T-0008 Multiple Vulnerabilities in Ethereal Software
3.12.27
IAVA0145 – 2002-T-0004 KTH Kerberos IV and V
3.12.28
IAVA0150 – 2005-T-0010 Multiple Vulnerabilities in Sybase Software
3.12.29
IAVA0155 – 2002-T-0008 Cachefsd Daemon
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
3.12.30
IAVA0160 – 2005-T-0017 IBM WebSphere Application Server
3.12.31
IAVA0165 – 2002-T-0009 Rpc.walld Service
3.12.32
IAVA0170 – 2005-T-0024 – Sun JRE Privilege Escalation Vulnerability
3.12.33
IAVA0175 – 2002-T-0011 OpenSSH Challenge Response
3.12.34
IAVA0180 – 2005-T-0025 Vulnerabilities in Adobe Reader
3.12.35
IAVA0185 – 2005-T-0027 MIT Kerberos Multiple Vulnerabilities
3.12.36
IAVA0190 – 2005-T-0033 Adobe Reader Buffer Overflow
3.12.37
IAVA0195 – 2002-T-0012 CDE Vulnerability
3.12.38
IAVA0210 – 2005-T-0038 Java System Server JAR Disclosure
3.12.39
IAVA0215 – 2002-A-0004 OpenSSL Vulnerability
3.12.40
IAVA0225 – 2002-B-0003 PHP Vulnerabilities
3.12.41
IAVA0235 – 2002-T-0015 XDR-Libraries
3.12.42
IAVA0245 – 2002-T-0016 KAdmind
3.12.43
IAVA0250 – 2005-A-0019 Oracle Applications Vulnerabilities
3.12.44
IAVA0255 – 2002-T-0017 X Font Server
3.12.45
IAVA0260 – 2005-A-0034 Oracle Applications Vulnerabilities
3.12.46
IAVA0270 – 2000-B-0008 BIND 8.2.2-P6 DoS Vulnerabilities
3.12.47
IAVA0275 – 2001-A-0001 Buffer Overflows in ISC BIND
3.12.48
IAVA0280 – 2002-A-0006 Multiple Vulnerabilities in ISC BIND 4 and 8
3.12.49
IAVA0285 – 2003-B-0001 DNS Vulnerabilities – Various Libraries
3.12.50
IAVA0295 – 2003-T-0001 Multiple SSH Vulnerabilities
3.12.51
IAVA0305 – 2003-T-0002 Solaris UUCP
3.12.52
IAVA0310 – 2005-T-0043 SMC HTTP TRACE Vulnerability
3.12.53
IAVA0315 – 2003-T-0004 Oracle 9i Vulnerabilities
3.12.54
IAVA0320 – 2003-T-0007 Sun XDR Library Buffer Overflow
3.12.55
IAVA0330 – 2003-B-0003 Sendmail - Memory Corruption Vulnerability
3.12.56
IAVA0335 – 2003-T-0015 PDF Writers
3.12.57
IAVA0345 – 2003-T-0018 Real Networks Helix Server
3.12.58
IAVA0350 – 2003-T-0020 OpenSSH Prior to 3.7.1
3.12.59
IAVA0355 – 2003-A-0013 SADMIND
3.12.60
IAVA0360 – 2003-A-0015 OpenSSL
3.12.61
IAVA0365 – 2003-T-0022 - JAVA RUNTIME and Virtual Machine
3.12.62
IAVA0370 – 2003-T-0024 - RSYNC DAEMON
3.12.63
IAVA0375 – 2004-A-0002 - Check Point Firewall-1
http://s3.amazonaws.com/0706/819143.html
Page 17
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 18
3.12.64
IAVA0380 – 2004-B-0002 - H.323 Protocol
3.12.65
IAVA0385 – 2004-A-0004 - ISS Real Secure
3.12.66
IAVA0390 – 2004-T-0003 – Apache SSL Certificate Forging
3.12.67
IAVA0395 – 2004-T-0008 – TCPDUMP Buffer Overflows
3.12.68
IAVA0400 – 2004-B-0005 – FreeBSD/Juniper Denial of Service
3.12.69
IAVA0405 – 2004-T-0006 Solaris Password Utility
3.12.70
IAVA0410 – 2004-B-0006 OpenSSL Denial of Service
3.12.71
IAVA0415 – 2004-B-0007 Linux JetAdmin Vulnerability
3.12.72
IAVA0420 – 2004-T-0014 CDE Remote Login
3.12.73
IAVA0425 – 2003-B-0005 Sendmail Prescan Variant Vulnerability
3.12.74
IAVA0430 – 2004-T-0016 Solaris Management Console Vulnerability
3.12.75
IAVA0435 – 2004-T-0017 MIT Kerberos Multiple Vulnerabilities
3.12.76
IAVA0440 – 2004-T-0018 Multiple Vulnerabilities in ISC DHCP 3
3.12.77
IAVA0445 – 2004-T-0032 Vulnerabilities in Apache Web Server
3.12.78
IAVA0455 –2000-B-0005 Input Validation Problem in rpc.statd
3.12.79
IAVA0460 – 2001-A-0002 IRIX Telnet
3.12.80
IAVA0465 –1999-B-0002 SGI Array Services
3.12.81
IAVA0470 – 1998-A-0010 SGI Buffer Overflow Vulnerability
3.12.82
IAVA0475 – 1999-A-0006 Statd and Automountd
3.12.83
IAVA0485 – 2001-T-0002 IRDP
3.12.84
IAVA0490 –2001-A-0003 SNMP to DMI Mapper Daemon
3.12.85
IAVA0495 –2001-T-007 Solaris Line Printer Daemon
3.12.86
IAVA0500 – 2000-B-0003 KDC Vulnerablity
3.12.87
IAVA0510 – 1999-A-0003 FTP RNFR Command Vulnerability
3.12.88
IAVA0515 – 1999-B-0003, 2000-B-0004, 2001-B-0004 WU-FTPd
3.12.89
IAVA0520 – 2006-A-0013 Sendmail remote execution vulnerability.
3.12.90
IAVA0530 – 2006-A-0007 Oracle E-Business Suite Vulnerabilities
3.12.91
IAVA0545 – 2005-B-0019 Vulnerabilities in IKE Packet Processing
3.12.92
IAVA0550 – 2006-A-0011 Vulnerabilities in Oracle E-Business Suite
3.12.93
IAVA0555 – 2006-A-0020 Vulnerabilities in Oracle E-Business Suite
3.12.94
IAVA0570 – 2006-A-0032 Multiple Vulnerabilities in Oracle E-Business Suite
3.12.95
IAVA0590 – 2006-T-0020 Mozilla Firefox/Thunderbird Vulnerabilities
3.12.96
IAVA0595 – 2006-T-0016 Sun Java Application Server Vulnerabilities
3.12.97
IAVA0600 – 1998-0011 General Internet Message Access Protocol (IMAP) and Post Office
Protocol (POP) Vulnerabilities
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 19
3.12.98
IAVA0605 – 1999-0001 Mountd Remote Buffer Overflow Vulnerability
3.12.99
IAVA0610 – 1999-0003 Remote FTP Vulnerability
3.12.100
IAVA0615 – 2000-T-0015 BMC Best/1 Version 6.3 Performance Management System
Vulnerability
3.12.101
IAVA0620 – 2000-B-0001 BIND NXT Buffer Overflow
3.12.102
IAVA0625 – 2000-B-0002 Netscape Navigator Improperly Validates SSL Sessions
3.12.103
IAVA0630 – 2000-A-0001 Cross-Site Scripting Vulnerability
3.12.104
IAVA0635 – 2001-B-0003 U Encoding Intrusion Detection System Bypass Vulnerability
3.12.105
IAVA0640 – 2002-T-0005 Multiple Vulnerabilities in Oracle Database Server
3.12.106
IAVA0645 – 2002-T-0006 Multiple Vulnerabilities in Oracle9i Application Server
3.12.107
IAVA0650 – 2002-T-0010 Denial of Service Vulnerability in ISC-BIND 9
3.12.108
IAVA0655 – 2002-T-SNMP-003 Multiple Simple Network Management Protocol
Vulnerabilities in Servers and Applications
3.12.109
IAVA0660 – 2002-A-SNMP-004 Multiple Simple Network Management Protocol
Vulnerabilities in Perimeter Devices
3.12.110
IAVA0665 – 2002-A-SNMP-005 Multiple Simple Network Management Protocol
Vulnerabilities in Enclave Devices
3.12.111
IAVA0670 – 2002-A-SNMP-006 Multiple Simple Network Management Protocol
Vulnerabilities in Servers and Applications
3.12.112
Server
IAVA0675 – 2003-A-0006 Multiple Vulnerabilities in Multiple Versions of Oracle Database
3.12.113
IAVA0680 – 2004-T-0002 Oracle 9i Application/Database Server Denial Of Service
Vulnerability
3.12.114
IAVA0685 – 2004-T-0005 Oracle9i Lite Mobile Server Multiple Vulnerabilities
3.12.115
IAVA0690 – 2004-T-0011 Oracle Application Server Web Cache HTTP Request Method
Heap Overrun Vulnerability
3.12.116
IAVA0695 – 2004-T-0022 Check Point VPN-1 ASN.1 Buffer Overflow Vulnerability
3.12.117
IAVA0700 – 2004-T-0026 Mozilla Network Security Services Library Remote Heap
Overflow Vulnerability
3.12.118
IAVA0705 – 2004-T-0027 Multiple Vulnerabilities in MIT Kerberos V
3.12.119
IAVA0710 – 2004-B-0009 Oracle E-Business Suite Multiple SQL Injection
3.12.120
Queuing
IAVA0715 – 2005-T-0031 Multiple Vulnerabilities in Computer Associates Message
3.12.121
IAVA0720 – 2005-B-0007 Symantec UPX Parsing Engine Remote Heap
3.12.122
IAVA0725 – 2005-B-0008 Trend Micro VSAPI ARJ Handling Heap Overflow
3.12.123
IAVA0730 – 2005-A-0043 Symantec AntiVirus Library RAR Decompression
3.12.124
IAVA0735 – 2006-T-0002 Multiple Vulnerabilities within BEA WebLogic Software
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 20
3.12.125
IAVA0740 – 2006-T-0005 Multiple Vulnerabilities in Mozilla Products
3.12.126
IAVA0745 – 2006-T-0007 Veritas NetBackup Multiple Remote Buffer Overflow
3.12.127
IAVA0755 – 2006-T-0009 Multiple Vulnerabilities in Symantec AntiVirus Engine
3.12.128
IAVA0760 – 2006-T-0013 RealVNC Remote Authentication Bypass
3.12.129
IAVA0765 – 2006-T-0023 Multiple Vulnerabilities in Wireshark
3.12.130
IAVA0770 – 2006-T-0035 Sun Java System/iPlanet Messaging Server
3.12.131
BIND
IAVA0775 – 2006-B-0016 Multiple Remote Denial of Service Vulnerabilities within ISC
3.12.132
IAVA0780 – 2006-B-0017 Multiple Vulnerabilities in Adobe Flash Player
3.12.133
IAVA0785 – 2006-A-0008 Computer Associates (CA) iTechnology iGateway Service
Vulnerability
3.12.134
IAVA0805 – 2006-A-0050 Multiple Vulnerabilities in Oracle E-Business Suite and
Applications
3.12.135
IAVA0810 – 2007-T-0001 MIT Kerberos 5 RPC Library Remote Code Execution
Vulnerability
3.12.136
IAVA0815 – 2007-T-0002 MIT Kerberos 5 Administration Daemon Remote Code Execution
Vulnerability
3.12.137
IAVA0820 – 2007-T-0003 Sun Java RunTime Environment GIF Images Buffer Overflow
Vulnerability
3.12.138
IAVA0825 – 2007-A-0001 Snort Backtracking Denial of Service Vulnerability
3.12.139
IAVA0830 – 2007-A-0002 Snort GRE Packet Decoding Integer Underflow Vulnerability
3.12.140
IAVA0835 – 2007-A-0006 Multiple Vulnerabilities in Adobe Acrobat
3.12.141
IAVA0840 – 2007-A-0007 Multiple Vulnerabilities in Oracle Database Server
3.12.142
IAVA0845 – 2007-A-0008 Multiple Vulnerabilities in Oracle Application Server
3.12.143
IAVA0850 – 2007-A-0009 Multiple Vulnerabilities in Oracle Collaboration Suite
3.12.144
IAVA0855 – 2007-A-0010 Multiple Vulnerabilities in Oracle E-Business Suite
3.12.145
IAVA0860 – 2007-A-0011 Multiple Vulnerabilities in Oracle Enterprise Manager
This page is intentionally left blank.
1. UNIX Overview and Site Information
1. System Equipement
1. GEN000020 – Single User Mode Password
Solaris 2.5 - 9
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 21
# cd /etc/rcS.d
# grep sulogin *
The sulogin utility should be called from within the svm start up script.
Additionally,
# more /etc/default/sulogin (if it exists)
Confirm PASSREQ=NO is not configured
Solaris 10
# more /etc/default/sulogin (if it exists)
Confirm PASSREQ=NO is not configured
By default Solaris 10 requires a password and the /etc/default/sulogin does not exist.
HP-UX
# more /tcb/files/auth/system/default
Confirm the d_boot_authenticate is:
:d_boot_authenticate:
The entry :d_boot_authenticate@: is a finding.
AIX
AIX has a chassis key that is used to prevent booting to single-user mode without a password.
Confirm it is in the correct position and the key has been removed.
IRIX
# more /etc/default/sulogin (if it exists)
Confirm PASSREQ=NO is not configured
Linux
# more /etc/inittab
Confirm the following line is configured:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 22
~~:S:wait:/sbin/sulogin
If the UNIX host is configurable and is bootable in single-user mode without a password, then this is a finding.
PDI:
GEN000020
V0000756
Category II
:
Status Code: AUTO
Previously:
G001
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2, IAIA-1, IAIA-2
PDI Description:
The UNIX host configurable and is bootable in single-user mode
without a password.
Reference:
UNIX STIG: 2.5.1.1
2. GEN000040 – Single User Mode Password Incompatibility Documentation
Solaris, HP-UX, AIX, IRIX, and Linux support single-user mode password.
If the UNIX host is not be configured to require a password when booted to single-user mode and is not justified
and documented with the IAO, then this is a finding.
This check is only applicable if GEN000020 is a finding.
PDI:
GEN000040
V0000757
Category II
:
Status Code: PART
Previously:
G002
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1, IAIA-2, DCID-1
PDI Description:
The UNIX host is not configured to require a password when booted to
single-user mode and is not justified and documented with the IAO.
Reference:
UNIX STIG: 2.5.1.1
3. GEN000060 – Single User Mode Password Incompatibility Location
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 23
Solaris, HP-UX, AIX, IRIX, and Linux support single-user mode password.
Solaris 2.5 - 9
# cd /etc/rcS.d
# grep sulogin *
The sulogin utility should be called from within the svm start up script.
Additionally,
Solaris 10
# more /etc/default/sulogin (if is exists)
Confirm PASSREQ=NO is not configured
Solaris 10
# more /etc/default/sulogin (if is exists)
Confirm PASSREQ=NO is not configured
HP-UX
# more /tcb/files/auth/system/default
Confirm the d_boot_authenticate is:
:d_boot_authenticate:
The entry :d_boot_authenticate@: is a finding.
AIX
AIX has a chassis key that is used to prevent booting to single-user mode without a password.
Confirm it is in the correct position and the key has been removed.
IRIX
# more /etc/default/sulogin (if is exists)
Confirm PASSREQ=NO is not configured
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 24
Linux
# more /etc/inittab
Confirm the following line is configured:
~~:S:wait:/sbin/sulogin
If the UNIX host can not be configured to require a password when booted to single-user mode and is not located
in a controlled access area accessible only by SAs, then this is a finding. An access-controlled area is defined as
requiring two different checks of an individual’s identity and authority before gaining access to the system.
Note: This check is only applicable if GEN000020 is a finding
PDI:
GEN000060
V0000758
Category II
:
Status Code: PART
Previously:
G003
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
PECF-1, PECF-2
PDI Description:
The UNIX host can not be configured to require a password when
booted to single-user mode and is not located in a controlled access
area accessible only by SAs.
Reference:
UNIX STIG: 2.5.1.1
4. GEN000080 – System Equipment Location
An access-controlled area is defined as requiring two different checks of an individual’s identity and authority
before gaining access to the system. One of the checks should require two factor authentication.
If the UNIX system equipment is not located in a controlled access area, then this is a finding.
PDI:
GEN000080
Category:II
Status Code: MAN
Previously:
G234
V0001063
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
PECF-1, PECF-2
PDI Description:
The UNIX system equipment is not located in a controlled access area.
Reference:
UNIX STIG: 2.5.1.1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 25
2. Operating System
1. GEN000100 – Supported Release
Check the release of the OS:
Solaris
# uname -a
Supported releases are 2.7 and newer.
HP-UX
# uname -a
Supported releases are 10.20 and newer.
AIX
# uname -a
Supported releases are 4.3 and newer, and 5.1 and newer.
IRIX
# uname -R
Supported releases are 6.5 and newer.
Linux
# uname -R
Supported releases are RedHat Enterprise 3 and newer and SUSE Enterpise 9 and later.
If the operating system is not a supported release, then this is a finding.
PDI:
GEN000100
Category:II
Status Code: AUTO
Previously:
N/A
V0011940
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 26
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The operating system is not a supported release.
Reference:
UNIX STIG: 2.5.2.1
2. GEN000120 – Vendor Recommended and Security Patches
Check installed patches:
Solaris
# patchadd –p |grep patch
or
# showrev –p | grep patch
HP-UX
# swlist –l fileset | grep patch
AIX
# /usr/sbin/instfix -c -i | cut -d":" -f1
IRIX
# versions | grep patch
Linux
# rpm –qa | grep patch
Compare the system output with the most current vendor recommended and security patches.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 27
If vendor recommended and security patches are not installed or are out-of-date, then this is a finding. Program
managed specific systems should follow their configuration management cycle which may be longer than a
normal vendor cycle.
PDI:
GEN000120
V0000783
Category II
:
Status Code: PART
Previously:
G033
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSL-1, VIVM-1
PDI Description:
Vendor recommended and security patches are not installed or are outof-date.
Reference:
UNIX STIG: 2.5.2.1
3. File Integrity
1. GEN000140 – Create and Maintain System Baseline
Confirm with the SA that a system baseline (all device files, all sgid and suid files, and system libraries and
binaries), to include cryptographic hashes of files in the baseline, has been created and is maintained.
If a system baseline (all device files, all sgid and suid files, and system libraries and binaries), to include
cryptographic hashes of files in the baseline, has not been created and is not maintained, then this is a finding.
PDI:
GEN000140
Category:II
Status Code: MAN
Previously:
N/A
V0011941
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-2
PDI Description:
A system baseline including cryptographic hashes is not created and
maintained.
Reference:
UNIX STIG: 2.5.3.1
2. GEN000160 – System Baseline Backup on Write-protected Media
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 28
Confirm with the SA that the system baseline backup is stored on write-protected media.
If the system baseline backup(s) are not stored on write-protected media, then this is a finding. This check only
applies to backups that are not maintained by automated remote backup systems such as Veritas Netbackup.
PDI:
GEN000160
Category:II
Status Code: MAN
Previously:
N/A
V0011942
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-2
PDI Description:
The system baseline backup(s) are not on write-protected media.
Reference:
UNIX STIG: 2.5.3.1
3. GEN000220 – System Baseline for System Libraries and Binaries Checking
Confirm with the SA that filesyst ems are checked at least weekly for unauthorized system libraries or binaries or
unauthorized modification to authorized system libraries or binaries.
If filesystems are not checked at least weekly for unauthorized system libraries or binaries or unauthorized
modification to authorized system libraries or binaries, then this is a finding.
PDI:
GEN000220
Category:II
Status Code: MAN
Previously:
N/A
V0011945
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-2
PDI Description:
Filesystems are not checked at least weekly for unauthorized system
libraries or binaries or unauthorized modification to authorized system
libraries or binaries.
Reference:
UNIX STIG: 2.5.3.1
4. GEN000240 – Network Time-Server
Check if NTP running:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 29
All platforms
# ps –e | egrep “xntpd|ntpd”
Check if ntpdate scheduled to run:
Solaris
# grep ntpdate /var/spool/cron/crontabs/*
HP-UX
# grep ntpdate /var/spool/cron/crontabs/*
AIX
# grep ntpdate /var/spool/cron/crontabs/*
IRIX
# grep ntpdate /var/spool/cron/crontabs/*
Linux
# grep ntpdate /var/spool/cron/*
# grep ntpdate /etc/cron.d/*
# grep ntpdate /etc/cron.daily/*
# grep ntpdate /etc/cron.hourly/*
# grep ntpdate /etc/cron.monthly/*
# grep ntpdate /etc/cron.weekly/*
If NTP is running or ntpdate is found:
# more /etc/ntp/ntp.conf
Confirm the servers and peers or multicastclient (as applicable) are local or an authoritative U.S.
DOD source.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 30
If a non-local/non-authoritative (U.S. DOD source) time-server is used, then this is a finding.
PDI:
GEN000240
Category I
:
V0004301
Status Code: AUTO
Previously:
G695
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCHW-1
PDI Description:
A non-local/non-authoritative (U.S. DOD source) time-server is used.
Reference:
UNIX STIG: 2.5.3.1
2. DISCRETIONARY ACCESS CONTROL AND GENERAL SECURITY
1. User Account Controls
1. GEN000260 – Shared Account Documentation
Solaris
Check for multiple accesses to an account from different workstations/IP addresses .
# last
HP-UX
Check for multiple accesses to an account from different workstations/IP addresses .
# last –R
# lastb -R
AIX
Check for multiple accesses to an account from different workstations/IP addresses .
# last
IRIX
Check for multiple accesses to an account from different workstations/IP addresses .
# last
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 31
Linux
Check for multiple accesses to an account from different workstations/IP addresses .
# last –R
Discuss with the SA whether shared accounts exist. A shared account is any account, other than root, that more
than one person knows the password to . If shared accounts do exist, confirm with the IAO shared accounts are
documented with the IAO. If a shared account is not justified and documented with the IAO, then this is a
finding.
PDI:
GEN000260
Category II
:
V0000759
Status Code: AUTO
Previously:
G006
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSD-1
PDI Description:
A shared account is not justified and documented with the IAO.
Reference:
UNIX STIG: 3.1
2. GEN000280 – Shared Account Direct Logon
Solaris
Check for multiple accesses to an account from different workstations/IP addresses .
# last
HP-UX
Check for multiple accesses to an account from different workstations/IP addresses .
# last –R
# lastb -R
AIX
Check for multiple accesses to an account from different workstations/IP addresses .
# last
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 32
IRIX
Check for multiple accesses to an account from different workstations/IP addresses .
# last
Linux
Check for multiple accesses to an account from different workstations/IP addresses .
# last –R
Confirm with the SA, if shared accounts exist, users log on to an individual account and switch user to the shared
account.
If a shared account is logged onto directly , then this is a finding.
Note: This check is only applicable if GEN000260 is a finding.
PDI:
GEN000280
Category II
:
V0000760
Status Code: PART
Previously:
G007
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1, IAIA-2, IAAC-1
PDI Description:
A shared account is logged onto directly.
Reference:
UNIX STIG: 3.1
2. Interactive Users
1. GEN000300 – Unique Account Name
Solaris
# logins –d
HP-UX
# pwck –s
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 33
AIX
# usrck –n ALL
IRIX
# cut –d ‘:’ –f1 /etc/passwd | uniq –d
If duplicates are found, perform the following to display full listing.
# grep “<account_name>” /etc/passwd
Linux
# pwck –r
If accounts have the same account name, then this is a finding.
PDI:
GEN000300
Category:III
Status Code: AUTO
Previously:
G008
V0000761
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1, IAIA-2, IAAC-1
PDI Description:
Accounts have the same user or account name.
Reference:
UNIX STIG: 3.1.1
2. GEN000320 – Unique UID
Solaris
# logins –d
HP-UX
# pwck –s
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 34
AIX
# usrck –n ALL
IRIX
# cut –d ‘:’ –f3 /etc/passwd | uniq –d
If duplicates are found, perform the following to display complete listing.
# grep “^.*:.*:<account_uid>” /etc/passwd
Linux
# pwck –r
If accounts have the same uid, then this is a finding.
PDI:
GEN000320
V0000762
Category II
:
Status Code: AUTO
Previously:
G009
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1, IAIA-2, IAAC-1
PDI Description:
Accounts have been assigned the same uid.
Reference:
UNIX STIG: 3.1.1
3. GEN000340 – Reserved System Account UIDs
# more /etc/passwd
Confirm all accounts with a uid of 99 and below (499 and below for Linux) are used by a system account.
If a uid reserved for system accounts, 0 – 99 (0 – 499 for Linux), is used by a non-system account without
documentation, then this is a finding. A regular account within this range must be justified and documented
with the IAO.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
GEN000340
V0011946
Page 35
Category II
:
Status Code: AUTO
Previously:
N/A
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECPA-1
PDI Description:
A uid reserved for system accounts, 0 – 99 (0 – 499 for Linux), is used
by a non-system account.
Reference:
UNIX STIG: 3.1.1
4. GEN000360 – Reserved System Account GIDs
# more /etc/passwd
Confirm all accounts with a gid of 99 and below (499 and below for Linux) are used by a system account.
If a gid reserved for system accounts, 0 – 99 (0 – 499 for Linux), is used by a non-system account without
documentation, then this is a finding. A regular account within this range must be justified and documented with
the IAO.
PDI:
GEN000360
V0000780
Category II
:
Status Code: AUTO
Previously:
G029
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECPA-1
PDI Description:
A gid reserved for system accounts is used by a non-system account.
gid 14 (sysadmin - Solaris) – may be used if documented
with the IAO.
gid 20 (users - HPUX) – may be used if documented with
the IAO.
Reference:
UNIX STIG: 3.1.1
5. GEN000380 – Groups Referenced in /etc/passwd
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 36
Solaris
# logins –d
HP-UX
# pwck –s
AIX
# grpck
IRIX
# more /etc/passwd
Compare with:
# more /etc/group
Confirm each gid referenced in the /etc/passwd file is listed in the /etc/group file.
Linux
# pwck –r
If a group referenced in the /etc/passwd file is not in the /etc/group file, then this is a finding.
PDI:
GEN000380
Category:IV
Status Code: AUTO
Previously:
G030
V0000781
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2, IAAC-1
PDI Description:
A group referenced in the /etc/passwd file is not in the /etc/group file .
Reference:
UNIX STIG: 3.1.1
3. Logon Warning Banner
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 37
1. GEN000400 – Logon Warning Banner Display
Login banners will be configured for all services that allow login access to the system. For TCP WRAPPERS, c
heck for hosts.allow and hosts.deny files and then look for banner files associated with them. For
ssh , locate the ssh configuration file, sshd_config or ssh2d_config . This file is usually located in /
etc/sshd , /etc/ssh2 , /etc/ssh , or /usr/local/etc . Confirm that the Banner variable
contains the full path to the file containing the Logon Warning banner. Other files specific to each vendor are
listed below.
Solaris
Check for logon warning banner display.
# more /etc/issue
# more /etc/motd
# more /etc/dt/config/*/Xresources (if GUI is implemented)
# more /etc/default/telnetd
(if telnet is implemented without
TCP_Wrappers)
(if ftp is implemented without
# more /etc/default/ftpd
TCP_Wrappers)
# more /etc/ftpd/banner.msg
(Solaris 9 and above, if ftp is
implemented without
TCP_Wrappers)
HP-UX
Check for logon warning banner display.
# more /etc/issue
# more /etc/motd
# more /etc/dt/config/*/Xresources (if GUI is implemented)
# more /etc/ftpaccess
(if ftp is implemented without
TCP_Wrappers – should contain banner=/etc/issue )
AIX
Check for logon warning banner display.
# more /etc/motd
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 38
# more /etc/dt/config/*/Xresources (if GUI is implemented)
# more /etc/ftpmotd
# more /etc/ftpaccess.ctl
# more /dev/console
# more /etc/security/login.cfg
IRIX
Check for logon warning banner display.
# last
Linux
Check for logon warning banner display .
# more /etc/issue
# more /etc/motd
# more /etc/issue.net
# more /etc/X11/xdm/Xresources (if GUI is implemented)
# more /etc/X11/xdm/kdmrc
(if GUI is implemented)
(if GUI is implemented)
# more /etc/X11/gdm/gdm
# more /etc/vsftpd.conf
(if ftp is implemented without
TCP_Wrappers)
If the Department of Defense (DOD) logon banner is not displayed prior to a logon attempt, then this is a finding.
PDI:
GEN000400
V0000763
Category II
:
Status Code: MAN++
Previously:
G010
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECWM-1
PDI Description:
The Department of Defense (DOD) logon banner is not displayed prior
to a logon attempt.
Reference:
UNIX STIG: 3.1.2
2. GEN000420 – Logon Warning Banner Content
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 39
Use the Example Banner in Appendix G , Sample Logon Warning Banner, for further information. An exact
match is not required as long as these five elements are included.
A compressed version (subset) may be used as long as the below listed points are included:
The system is a DOD system.
The system is subject to monitoring.
Monitoring is authorized in accordance with applicable laws and regulations and conducted for purposes of
systems management and protection, protection against improper or unauthorized use or access, and
verification of applicable security features or procedures.
Use of the system constitutes consent to monitoring.
This system is for authorized US government use only.
If the Department of Defense (DOD) login banner does not contain the required notice and consent information,
then this is a finding.
PDI:
GEN000420
V0000764
Category II
:
Status Code: MAN++
Previously:
G011
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECWM-1
PDI Description:
The Department of Defense (DOD) login banner does not contain the
required notice and consent information.
Reference:
UNIX STIG: 3.1.2
4. Account Access
1. GEN000440 – Logging Login Attempts
Solaris
Check if successful logons are being logged.
# last | more
Check if unsuccessful logons are being logged .
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 40
# ls –l /var/adm/loginlog
HP-UX
Check if successful logons are being logged .
# last –R | more
Check if unsuccessful logons are being logged .
# lastb –R | more
AIX
Check if successful logons are being logged .
# last | more
Check if unsuccessful logons are being logged .
# last –f
/etc/security/failedlogin | more
IRIX
Check for multiple accesses to an account from different workstations/IP addresses .
# last | more
Linux
Check if successful logons are being logged .
# last –R | more
Check if unsuccessful logons are being logged .
# lastb –R | more
If successful and unsuccessful logins and logouts are not logged, then this is a finding.
PDI:
GEN000440
V0000765
Category II
:
Status Code: AUTO
Previously:
G012
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECAR-1, ECAR-2, ECAR-3
PDI Description:
Successful and unsuccessful logins and logouts are not logged.
Reference:
UNIX STIG: 3.1.3
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 41
2. GEN000460 – Three Failed Login Attempts
Solaris 5.1 through Solaris 9
Confirm RETRIES is set to 3 or less in /etc/default/login. This does not lock the account, but will discourage
brute force password guessing attacks.
# grep RETRIES /etc/default/login
Solaris 10
Confirm LOCK_AFTER_RETRIES is set to YES.
# grep LOCK_AFTER_RETRIES /etc/security/policy.conf
HP-UX
Confirm the u_maxtries is set to 3 or less, but not 0.
# grep :u_maxtries# /tcb/files/auth/system/default
AIX
Confirm the loginretries field is set to 3 or less, but not 0 for each user.
# /usr/sbin/lsuser -a loginretries ALL
IRIX
Confirm LOCKOUT is set to 3 or less, but not 0.
# grep LOCKOUT /etc/default/login
Linux
#
more /etc/pam.d/system-auth
Confirm the following line is configured;
account required
/lib/security/pam_tally.so deny=3 no_magic_root reset
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 42
If the above settings are not correct, then this is a finding.
PDI:
GEN000460
V0000766
Category II
:
Status Code: AUTO
Previously:
G013
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLO-1, ECLO-2
PDI Description:
After three consecutive unsuccessful login attempts, the account is not
disabled.
Reference:
UNIX STIG: 3.1.3
3. GEN000480 – Login Delay
Solaris
Confirm SLEEPTIME is set to 4 or more, or that this variable is not configured as 4 is the system dafault.
# grep SLEEPTIME /etc/default/login
Note: This check is currently not applicable for Solaris 5.10.
HP-UX
Confirm the t_logdelay is set to 4 or more.
# grep :t_logdelay# /tcb/files/auth/system/default
AIX
Confirm the logindelay field is set to 4 or more.
# grep logindelay /etc/security/login.cfg
IRIX
Confirm SLEEPTIME is set to 4 or more.
# grep SLEEPTIME /etc/default/login
Linux
Confirm FAIL_DELAY is set to 4 or more.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 43
# grep FAIL_DELAY /etc/login.defs
PDI:
GEN000480
V0000768
Category II
:
Status Code: AUTO
Previously:
G015
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLO-1, ECLO-2
PDI Description:
The login delay between login prompts after a failed login is set to at
least four seconds.
Reference:
UNIX STIG: 3.1.3
5. Inactivity Timeout/Locking
1. GEN000500 – Inactivity
This requirement can be satisfied with policy or a SOP to configure terminals and workstations with a screen lock
or password protected screen saver after 15 idle minutes. The windows software may also be configured to
support it.
For systems configured to use XLock, the command xlock will lock the display session. For systems configured
to use XScreensaver, the command xscreensaver-command –lock will lock the display session. Ask the
SA to verify, at the command line, one of the screen-locking commands actually locks the display.
Solaris, under OpenWindows, uses a command called xlock for manually locking displays. HP 10.X uses a
command called lock that works on ASCII (not Windows) displays. Both Solaris and HP 10.X windows
systems offer a lock icon that will lock the display just by clicking on it.
If there is no terminal lockout or session disconnect after 15 inactive minutes requiring the account password to
resume or a new session, then this is a finding.
PDI:
GEN000500
V0004083
Category II
:
Status Code: MAN
Previously:
G605
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
PESL-1
PDI Description:
There is no terminal lockout or session disconnect after 15 inactive
minutes requiring the account password to resume or a new session.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 44
Reference:
UNIX STIG: 3.1.4
2. GEN000520 – Continuous Display
If there is an application running on the system that is continuously in use (such as a network monitoring
application), ask the SA what the name of the application is.
# ps –ef | more
If the logon session for an application requiring a continuous display does not ensure:
The logon session is not a root session.
The inactivity exemption is justified and documented with the IAO.
The display station (e.g., keyboard, CRT) is located in a controlled access area.
Then this is a finding.
PDI:
GEN000520
V0000769
Category II
:
Status Code: MAN
Previously:
G016
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The logon session for an application requiring a con tinuous display
does not ensure:
The logon session is not a root session .
The inactivity exemption is justified and documented with the
IAO.
The display station (e.g., keyboard, CRT) is located in a
controlled access area.
Reference:
UNIX STIG: 3.1.4
6. Password Guidelines
1. GEN000540 – Password Change 24 Hours
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 45
Solaris
Confirm the min days field (the 4 th field) is set to 1 or more for each user.
# more /etc/shadow
HP-UX
Confirm the mintm is set to 1 or more for each user.
# getprpw -r -m mintm <USER>
AIX
Confirm the minage field is set to 1 or more for each user.
# /usr/sbin/lsuser -a minage ALL
IRIX
Confirm the min days field (the 4th field) is set to 1 or more for each user.
# more /etc/shadow
Linux
Confirm the min days field (the 4 th field) is set to 1 or more for each user.
# more /etc/shadow
If passwords can be changed more than once every 24 hours, then this is a finding.
PDI:
GEN000540
V0001032
Category II
:
Status Code: AUTO
Previously:
G004
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAAC-1
PDI Description:
Passwords can be changed more than once every 24 hours.
Reference:
UNIX STIG: 3.2.1
2. GEN000560 – Password Protect Enabled Accounts
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 46
Examine the /etc/shadow (or equivalent) looking for accounts with blank passwords using the following
commands:
SOLARIS
#
pwck
HP-UX
#
pwck –s or authck –p
AIX
#
pwdck –n ALL
IRIX
#
awk –F’:’ ‘{ if ( $2 == NULL ) print $0; }’ < /etc/shadow
Linux
# grep nullok /etc/pam.d/system-auth
If an entry for nullok is found, then this is a finding on Linux.
PDI:
GEN000560
V0000770
Category I
:
Status Code: AUTO
Previously:
G018
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1, IAIA-2, DCCS-1, DCCS-2
PDI Description:
An enabled account on the system is not password protected.
Reference:
UNIX STIG: 3.2.1
3. GEN000580 – Password Length
Solaris
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 47
Confirm PASSLENGTH is set to 9 or more.
# grep PASSLENGTH /etc/default/passwd
HP-UX
Confirm MIN_PASSWORD_LENGTH is set to 9 or more
# grep MIN_PASSWORD_LENGTH /etc/default/security
AIX
Confirm the minlen field is set to 9 or more for each user.
# /usr/sbin/lsuser -a minlen ALL
IRIX
Confirm PASSLENGTH is set to 9 or more for each user.
# grep PASSLENGTH /etc/default/passwd
Linux
Confirm pass_min_len is set to 9 or more for each user.
# grep minlen /etc/pam.d/passwd
If a password does not contain a minimum of 9 characters, then this is a finding.
PDI:
GEN000580
V0011947
Category II
:
Status Code: AUTO
Previously:
G019
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSS-1, DCSS-2
PDI Description:
A password does not contain a minimum of 9 characters.
Reference:
UNIX STIG: 3.2.1
4. GEN000600 – Password Character Mix
Verify that at least 2 lowercase letters are required and at least 2 upper case letters.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 48
Solaris 9 and prior
This check is not applicable.
Solaris 10
Confirm MINLOWER is set to at least 2 and MINUPPER is set to at least 2.
# egrep “MINLOWER|MINUPPER” /etc/default/passwd
HP-UX
# grep PASSWORD_MIN_LOWER_CASE_CHARS /etc/default/security
# grep PASSWORD_MIN_UPPER_CASE_CHARS /etc/default/security
AIX
# grep minalpha /etc/security/user
Linux
# egrep lcredit|ucredit /etc/pam.d/system-auth
Lcredit and ucredit should be set to -2.
If the settings do not enforce at least two lower case letters and two upper case letter s, then this is a finding.
PDI:
GEN000600
V0011948
Category II
:
Status Code: PART
Previously:
G019
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSS-1, DCSS-2
PDI Description:
A password does not contain at least two upper and two lower
alphabetic characters.
Reference:
UNIX STIG: 3.2.1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 49
5. GEN000620 – Password Character Mix
Solaris 9 and prior
This check is not applicable.
Solaris 10
Confirm MINDIGIT is greater than or equal to 2.
# grep MINDIGIT /etc/default/passwd
HP-UX
# grep PASSWORD_MIN_DIGIT_CHARS /etc/default/security
AIX
# grep minother /etc/security/user
Linux
# grep dcredit /etc/pam.d/system-auth
Dcredit should be set to -2.
If the minimum digits setting is not greater than or equal to 2, then this is a finding.
PDI:
GEN000620
V0011972
Category II
:
Status Code: PART
Previously:
G019
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSS-1, DCSS-2
PDI Description:
A password does not contain at least two numeric characters.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 50
Reference:
UNIX STIG: 3.2.1
6. GEN000640 – Password Character Mix
Solaris 9
Not applicable
Solaris 10
Confirm MINSPECIAL is 2 or greater.
# grep MINSPECIAL /etc/default/passwd
HP-UX
-
# grep PASSWORD_MIN_SPECIAL_CHARS /etc/default/security
- Linux
# grep ocredit /etc/pam.d/passwd
or
# grep ocredit /etc/pam.d/system-auth
Ocredit should be set to -2.
- AIX
Not applicable
If the special characters setting is not greater than or equal to 2, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
GEN000640
V0011973
Page 51
Category II
:
Status Code: PART
Previously:
G019
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSS-1, DCSS-2
PDI Description:
A password does not contain at least two special characters.
Reference:
UNIX STIG: 3.2.1
7. GEN000660 – Password Contents
This is a manual check of site policy, in most cases. Refer to Appendix E, Password Protection Schemes , for
password configuration guidelines.
PDI:
GEN000660
V0011974
Category II
:
Status Code: MAN
Previously:
G019
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSS-1, DCSS-2
PDI Description:
A password contains information such as names, telephone numbers,
account names, dictionary words, etc.
Reference:
UNIX STIG: 3.2.1
8. GEN000680 – Password Contents
This check will only apply to Solaris 10 and AIX. Most other operating systems have not implemented the
password complexity to comply with this check.
Solaris 10
Confirm MAXREPEATS is set to less than 3.
# grep MAXREPEATS /etc/default/passwd
-
AIX
Confirm maxrepeats is set to less than 3.
# g rep –i maxrepeats /etc/security/ user
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 52
If the maxrepeats variable is greater than 3, then this is a finding.
PDI:
GEN000680
V0011975
Category II
:
Status Code: PART
Previously:
G019
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSS-1, DCSS-2
PDI Description:
A password contains consecutive repeating characters.
Reference:
UNIX STIG: 3.2.1
9. GEN000700 – Password Change Every 60 Days
Solaris
Confirm the max days field (the 5 th field) is set to 60 or less, but not 0 for each user.
# more /etc/shadow
HP-UX
Confirm the exptm is set to 60 or less, but not 0 for each user.
# getprpw -r -m exptm <USER>
AIX
Confirm the maxage field is set to 60 or less, but not 0 for each user.
# /usr/sbin/lsuser -a maxage ALL
IRIX
Confirm the min days field (the 5th field) is set to 1 or more for each user.
# more /etc/shadow
Linux
Confirm the max days field (the 5 th field) is set to 60 or less, but not 0 for each user.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 53
# more /etc/shadow
If passwords are not changed at least every 60 days, then this is a finding.
PDI:
GEN000700
V0011976
Category II
:
Status Code: AUTO
Previously:
G020
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSS-1, DCSS-2
PDI Description:
Passwords are not changed at least every 60 days .
Reference:
UNIX STIG: 3.2.1
10. GEN000740 – Password Change Every Year
Ask the SA if there are any automated processing accounts on the system. If there are accounts on the system,
ask the SA if the passwords for those automated accounts are changed at least once a year. If not, then this is a
finding.
PDI:
GEN000740
Category:II
Status Code: MAN
Previously:
AD33
V0011977
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSS-1, DCSS-2
PDI Description:
A non-interactive/automated processing account password is not
changed at least once a year .
Reference:
UNIX STIG: 3.2.1
11. GEN000760 – Inactive Accounts are not locked
Indications of inactive accounts are those that have no entries in the last log. Check the date in the last log to
verify it is within the last 35 days. If an inactive account is not disabled via an entry in the password field in the /
etc/passwd or /etc/shadow (or TCB equivalent), check the /etc/passwd file to check if the account
has a valid shell. If not, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 54
GEN000760
V0000918
Category II
:
Status Code: AUTO
Previously:
G071
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAAC-1, DCSS-1, DCSS-2
PDI Description:
An account is not locked after 35 days of inactivity .
Reference:
UNIX STIG: 3.2.1
12. GEN000780 – Easily Guessed Passwords
Check this PDI by running a password strength application, such as Crack or Jack the Ripper, on the system. If
those are not available, then the check should be marked as Not Reviewed with an appropriate explanation in the
Remarks field.
PDI:
GEN000780
V0002390
Category I
:
Status Code: AUTO
Previously:
G511
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1
PDI Description:
Easily guessed passwords are used.
Reference:
UNIX STIG: 3.2.1
13. GEN000800 – Password Reuse
Solaris 10
Confirm HISTORY is set to 5 or more.
# grep HISTORY /etc/default/passwd
HP-UX
# grep HISTORY /etc/default/security
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 55
Linux
# ls /etc/security/opasswd
#
more /etc/pam.d/system-auth |grep password |
grep pam_unix.so | grep remember
If /etc/security/opasswd does not exist, then this is a finding. If the ‘remember’ option in /etc/
pam.d/system-auth is not set to 5, then this is a finding.
If passwords are reused witin the last five changes, then this is a finding.
PDI:
GEN000800
V0004084
Category II
:
Status Code: AUTO
Previously:
G606
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1
PDI Description:
Passwords are reused witin the last five changes.
Reference:
UNIX STIG: 3.2.1
14. GEN000820 – Global Password Configuration Files
Solaris
Confirm MINWEEKS is set to 1 or more.
# grep MINWEEKS /etc/default/passwd
Confirm MAXWEEKS is set to 8 or less, but not 0.
# grep MAXWEEKS /etc/default/passwd
HP-UX
Confirm the default mintm is set to 1 or more
# getprdef -r -m mintm
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 56
Confirm the default exptm is set to 60 or less, but not 0
# getprdef -r -m exptm
AIX
Confirm the following:
# grep minage /etc/security/user
# grep maxage /etc/security/user
IRIX
Confirm MINWEEKS is set to 1 or more.
# grep MINWEEKS /etc/default/passwd
Confirm MAXWEEKS is set to 1 or more.
# grep MAXWEEKS /etc/default/passwd
Linux
Confirm PASS_MIN_DAYS is set to 1 or more.
# grep PASS_MIN_DAYS /etc/login.defs
Confirm PASS_MAX_DAYS is set to 60 or less, but not 0.
# grep PASS_MAX_DAYS /etc/login.defs
If global password configuration files are not configured per guidelines, then this is a finding.
PDI:
GEN000820
V0011978
Category II
:
Status Code: AUTO
Previously:
N/A
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1, DCSS-1, DCSS-2
PDI Description:
Global password configuration files are not configured per guidelines.
Reference:
UNIX STIG: 3.2.1
15. GEN000840 – Root Account Access
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 57
Ask the SA for the names of people sharing the root password and verify that they are security or SA personnel.
Ask the SA if the root users are documented with the IAO. If they are not, then this is a finding.
PDI:
GEN000840
V0004303
Category II
:
Status Code: MAN
Previously:
G691
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECPA-1
PDI Description:
Access to the root account is not limited to security and administrative
users who require such access and not documented with the IAO.
Reference:
UNIX STIG: 3.2.1
16. GEN000860 – Password Change for Administrative Passwords Upon SA
Reassignment
Ask the SA or the IAO for the password procedures that state the root passwords are changed upon administrator
reassignment. If there is not such documentation, then this is a finding.
PDI:
GEN000860
Category:III
Status Code: MAN
Previously:
AD16
V0000971
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECPA-1, IAAC-1
PDI Description:
Administrative passwords are not changed when an individual with
access to the root password is reassigned.
Reference:
UNIX STIG: 3.2.1
7. Root Account
1. GEN000880 – Root’s UID
Perform the following to check for a duplicate root uid:
# grep “:0:” /etc/passwd | awk –F”:” ‘{print$1”:”$3”:”}’ |
grep “:0:”
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 58
If any accounts are shown in addition to root, then this is a finding.
PDI:
GEN000880
V0000773
Category II
:
Status Code: AUTO
Previously:
G021
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECPA-1
PDI Description:
An account other than root has a uid of 0.
Reference:
UNIX STIG: 3.3
2. GEN000900 – Root’s Home Directory
Perform the following to check compliance:
# grep “^root” /etc/passwd | awk –F”:” ‘{print $6}’
If the root user home directory is /, then this is a finding.
PDI:
GEN000900
Category:IV
Status Code: AUTO
Previously:
G022
V0000774
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
The root account home directory has not been changed from ‘/’.
Reference:
UNIX STIG: 3.3
3. GEN000920 – Root’s Home Directory Permissions
Perform the following as root:
# grep “^root” /etc/passwd | awk –F”:” ‘{print $6}’
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 59
# ls –ld <root home directory>
If the permissions of the root home directory are greater than 700, then this is a finding. If the home directory is
/ , this check will be marked Not Applicable.
PDI:
GEN000920
V0000775
Category II
:
Status Code: AUTO
Previously:
G023
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
The root account home directory (other than ‘ /’) is more permissive
than 700.
Reference:
UNIX STIG: 3.3
4. GEN000940 – Root’s Search Path
As the root user perform the following to check the search path:
#
echo $PATH
If the PATH variable contains a ‘.’ or ‘::’ or starts or ends with ‘:’ then this is a finding.
PDI:
GEN000940
V0000776
Category II
:
Status Code: AUTO
Previously:
G024
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
The root account’s search path contains a ‘.’, ‘::’, or starts or ends with
a ‘:’..
Reference:
UNIX STIG: 3.3
5. GEN000960 – Root’s Search Path
As the root user perform the following to check the search path:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
#
Page 60
echo $PATH
#
ls –ld <each directory in path variable>
If any of the directories in the PATH variable are world writeable, then this is a finding.
PDI:
GEN000960
V0000777
Category II
:
Status Code: AUTO
Previously:
G025
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
The root account has world writable directories in its search path.
Reference:
UNIX STIG: 3.3
6. GEN000980 – Root Console Access
Solaris
Confirm CONSOLE is set to /dev/console .
# grep CONSOLE=/dev/console /etc/default/login
HP-UX
Confirm /etc/securetty exists and is empty or contains only the word console or /dev/null .
# more /etc/securetty
AIX
# /user/sbin/lsuser –a rlogin root
IRIX
Confirm CONSOLE is set to /dev/console or the console device.
# grep CONSOLE /etc/default/login
Linux
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 61
Confirm /etc/securetty exists and is empty or contains only the word console or a single tty
device.
# more /etc/securetty
PDI:
GEN000980
Category II
:
V0000778
Status Code: AUTO
Previously:
G026
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1, IAIA-2
PDI Description:
The root account can be directly logged into from somewhere other
than the system console.
Reference:
UNIX STIG: 3.3
7. GEN001000 – Remote Consoles
Solaris 2.5, 2.6, and 7
Confirm CONSOLE is set to /dev/console .
# grep CONSOLE=/dev/console /etc/default/login
Solaris 8, 9, and 10
Confirm there is no output from the below mentioned command.
# consadm –p
HP-UX
Confirm /etc/securetty exists and is empty or contains only the word console or /dev/null .
# more /etc/securetty
AIX
Ensure /etc/security/login.cfg does not define an alternate console.
# more /etc/security/login.cfg
IRIX
Confirm CONSOLE is set to /dev/console or the console device.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 62
# grep CONSOLE /etc/default/login
Linux
Confirm /etc/securetty exists and is empty or contains only the word console or a single tty
device.
# more /etc/securetty
PDI:
GEN001000
V0004298
Category II
:
Status Code: AUTO
Previously:
G698
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCHW-1
PDI Description:
There are remote consoles defined.
Reference:
UNIX STIG: 3.3
8. GEN001020 – Direct Root Login
Perform the following to check if root is logging in directly:
# last root |grep –v reboot
If any entries exist for root other than the console, then this is a finding.
PDI:
GEN001020
V0011979
Category II
:
Status Code: AUTO
Previously:
N/A
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1, IAIA-2, IAAC-1
PDI Description:
The root account is logged onto directly.
Reference:
UNIX STIG: 3.3
9. GEN001060 – Log Root Access Attempts
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 63
Check the following log files to determine if access to the root account is being logged. Try to su – and enter
an incorrect password.
Solaris
# more /var/adm/sulog
HP-UX
# more /var/adm/sulog
AIX
# more /var/adm/sulog
IRIX
# more /var/adm/sulog
Linux
# more /var/log/messages
or
# more/var/adm/sulog (configurable from /etc/default/su)
If root login accounts are not being logged, then this is a finding.
PDI:
GEN001060
V0011980
Category II
:
Status Code: AUTO
Previously:
G027
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECAR-1, ECAR-2, ECAR-3
PDI Description:
Successful and unsuccessful access to the root account are not logged.
Reference:
UNIX STIG: 3.3
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 64
10. GEN001080 – Root Shell
Perform the following to determine if /usr is partitioned.
# grep “/usr” /etc/vfstab
or
#grep “/usr” /etc/fstab
If /usr is partitioned, check the location of root’s default shell.
# grep "^root:" /etc/passwd | grep ":/usr"
If the root shell is found to be a partitioned /usr filesystem, then this is a finding.
PDI:
GEN001080
Category:III
Status Code: AUTO
Previously:
G229
V0001062
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSS-1, DCSS-2
PDI Description:
The root shell is located in /usr and /usr is partitioned.
Reference:
UNIX STIG: 3.3
8. Encrypted Root Access
1. GEN001100 – Encrypting Root Access
Perform the following to determine if root has logged in over an unencrypted network connection. The first
command determines if root has logged in over a network. The second will check to see if ssh is installed.
Solaris
# last
| grep “^root “ | egrep –v “reboot|console” | more
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 65
# ps –ef |grep sshd
HP-UX
# last –R
| grep “^root “ | egrep –v “reboot|console” | more
# ps –ef |grep sshd
AIX
# last
| grep “^root “ | egrep –v “reboot|console”
| more
# ps –ef |grep sshd
IRIX
# last
| grep “^root “ | egrep –v “reboot|console” | more
# ps –ef |grep sshd
Linux
# last | grep “^root “ | egrep –v “reboot|console” | more
# ps –ef |grep sshd
If the output from the ‘ last ’ command shows root has logged in over the network and sshd is not running,
then this is a finding.
PDI:
GEN001100
V0001046
Category I
:
Status Code: AUTO
Previously:
G499
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECPA-1, IAIA-1, IAIA-2
PDI Description:
The root password is passed over a network in clear text form.
Reference:
UNIX STIG: 3.3.1
2. GEN001120 – Encrypting Root Access
Perform the following to determine if ssh disables root logins:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
#
Page 66
find / -name sshd_config –print
#
permitrootlogin
grep –v “^#” <sshd_config path> | grep –i
If the PermitRootLogin entry is found uncommented and set to yes, then this is a finding.
PDI:
GEN001120
V0001047
Category II
:
Status Code: AUTO
Previously:
G500
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECPA-1, IAAC-1
PDI Description:
An encrypted remote access program, such as ssh, does not disable the
capability to log directly on as root.
Reference:
UNIX STIG: 3.3.1
9. File and Directory Controls
1. GEN001140 – Uneven File Permissions
Perform:
#
ls –lL <system directory>
to check the permissions for files in /etc , /bin , /usr/bin , /usr/lbin , /usr/usb , /sbin , and /
usr/sbin. Uneven file permission exist if the file owner has less privileges than the group or world users and
when the file is owned by a privileged user or group (such as root or bin) .. If any of the files in the above listed
directories contain uneven file permissions, then this is a finding.
PDI:
GEN001140
V0000784
Category II
:
Status Code: AUTO
Previously:
G034
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
There are files or directories with uneven access permissions.
Reference:
UNIX STIG: 3.4
2. GEN001160 – Unowned Files
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 67
Perform:
#
find / nouser print > nousers
and
#
find / -nogroup –print > nogroup
If there are any files list ed either in the nousers or nogroup files created from the above commands,
then this is a finding.
PDI:
GEN001160
V0000785
Category II
:
Status Code: AUTO
Previously:
G035
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
There are unowned files.
Reference:
UNIX STIG: 3.4
3. GEN001180 – Network Services Daemon Permissions
Perform the following to check the permssions:
Solaris
# ls –la /usr/bin or /usr/sbin
HP-UX
# ls –la /usr/lbin
AIX
# ls –la /usr/sbin
IRIX
# ls –la /usr/etc
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 68
Linux
# ls –la /usr/sbin
If any of the files that are used to start network daemons in the above directories have permissions greater than
755, then this is a finding.
Note: Network daemons that may not reside in these directories (such as httpd or sshd) must also be checked for
the correct permissions.
PDI:
GEN001180
V0000786
Category II
:
Status Code: AUTO
Previously:
G036
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
Network services daemon file is more permissive than 755.
Reference:
UNIX STIG: 3.4
4. GEN001200 – System Command Permissions
Perform:
#
ls –lL <system directory>
to check the permissions for files in /etc , /bin , /usr/bin , /usr/lbin , /usr/usb , /sbin , and /
usr/sbin . If the file permissions are greater than 755, and the files are system commands, then this is a
finding.
Note: Elevate to Category Code I if world writable.
.
PDI:
GEN001200
V0000794
Category II
:
Status Code: AUTO
Previously:
G044
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
System command is more permissive than 755.
Reference:
UNIX STIG: 3.4
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 69
5. GEN001220 – System Files, Programs, and Directories Ownership
Perform:
#
ls –lL <system directory>
to check the owner for files in /etc , /bin , /usr/bin , /usr/lbin , /usr/usb , /sbin , and /usr/
sbin . If the files are not owned by a system account or application, then this is a finding.
PDI:
GEN001220
V0000795
Category II
:
Status Code: AUTO
Previously:
G045
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
System files, programs, and directories are not owned by a system
account.
Reference:
UNIX STIG: 3.4
6. GEN001240 – System Files, Programs, and Directories Group Ownership
Perform:
#
ls –lL <system directory>
to check the group owner for files in /etc , /bin , /usr/bin , /usr/lbin , /usr/usb , /sbin , and /
usr/sbin . If the files are not owned by a system group or application group, then this is a finding.
PDI:
GEN001240
V0000796
Category II
:
Status Code: AUTO
Previously:
G046
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
System files, programs, and directories are not owned by a system
group.
Reference:
UNIX STIG: 3.4
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 70
7. GEN001260 – System Log File Permissions
Most syslog messages are logged to /var/log, /var/log/syslog , or /var/adm directories. Check
the permissions by performing the following:
#
ls –lL <syslog directory>
If any of the log files permissions are greate r than 640, then this is a finding.
PDI:
GEN001260
V0000787
Category II
:
Status Code: AUTO
Previously:
G037
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECTP-1, ECCD-1, ECCD-2
PDI Description:
System log file is more permi ssive than 640.
Reference:
UNIX STIG: 3.4
8. GEN001280 – Manual Page File Permissions
Check the man pages permissions by performing the following:
#
ls –lL /usr/share/man
#
ls –lL /usr/share/info
#
ls –lL /usr/share/infopage
If any files in the above directories have permissions greater than 644, then this is a finding.
PDI:
GEN001280
Category:III
Status Code: AUTO
Previously:
G042
V0000792
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2, ECCD-1, ECCD-2
PDI Description:
Manual page file is more permissive than 644.
Reference:
UNIX STIG: 3.4
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 71
9. GEN001300 – Library File Permissions
Check the library permissions by performing the following:
#
ls –lL /usr/lib/*
If any of the file permissions are greater than 755, then this is a finding.
PDI:
GEN001300
V0000793
Category II
:
Status Code: AUTO
Previously:
G043
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSL-1, ECCD-1, ECCD-2
PDI Description:
Library file is more permissive than 755.
Reference:
UNIX STIG: 3.4
10. GEN001320 – NIS/NIS+/yp File Ownership
Perform the following to check NIS file ownership:
Solaris
# ls –la /usr/lib/netsvc/yp
HP-UX
# ls –la /var/yp/<nis domainname>
AIX
# ls –la /usr/lib/netsvc/yp or /usr/lib/nis
IRIX
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 72
# ls –la /usr/var/yp/<nis domainname>
Linux
# ls –la /var/yp/<nis domainname>
If the file ownership is not root, sys, bin, then this is a finding.
PDI:
GEN001320
V0000789
Category II
:
Status Code: AUTO
Previously:
G039
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
NIS/NIS+/yp files are not owned by root, sys or bin.
Reference:
UNIX STIG: 3.4
11. GEN001340 – NIS/NIS+/yp File Group Ownership
Perform the following to check NIS file group ownership:
Solaris
# ls –la /usr/lib/netsvc/yp
HP-UX
# ls –la /var/yp/<nis domainname>
AIX
# ls –la /usr/lib/netsvc/yp or /usr/lib/nis
IRIX
# ls –la /usr/var/yp/<nis domainname>
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 73
Linux
# ls –la /var/yp/<nis domainname>
If the file group ownership is not root, sys, bin or other, then this is a finding.
PDI:
GEN001340
V0000790
Category II
:
Status Code: AUTO
Previously:
G040
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
NIS/NIS+/yp files are not group owned root, sys, bin, or other.
Reference:
UNIX STIG: 3.4
12. GEN001360 – NIS/NIS+/yp File Permissions
Perform the following to check NIS file permissions:
Solaris
# ls –la /usr/lib/netsvc/yp
HP-UX
# ls –la /var/yp/<nis domainname>
AIX
# ls –la /usr/lib/netsvc/yp or /usr/lib/nis
IRIX
# ls –la /usr/var/yp/<nis domainname>
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 74
Linux
# ls –la /var/yp/<nis domainname>
If any of the file permissions are greater than 755, then this is a finding.
PDI:
GEN001360
V0000791
Category II
:
Status Code: AUTO
Previously:
G041
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2, ECCD-1, ECCD-2
PDI Description:
NIS/NIS+/yp command file is more permissive than 755.
Reference:
UNIX STIG: 3.4
13. GEN001380 – /etc/passwd File Permissions
Check /etc/passwd permissions:
# ls –lL /etc/passwd
If /etc/passwd is more permissive than 644, then this is a finding.
PDI:
GEN001380
V0000798
Category II
:
Status Code: AUTO
Previously:
G048
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
The /etc/passwd file is more permissive than 644.
Reference:
UNIX STIG: 3.4
14. GEN001400 – /etc/passwd and/or /etc/shadow File Ownership
Check /etc/passwd ownership:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 75
# ls –lL /etc/passwd
Check /etc/shadow and equivalent file(s) ownership:
HP-UX
The TCB structure of HP-UX and other flavors of UNIX is radically different from the /etc/shadow
structure found in Solaris. The file permissions and uids/gids should be as follows, and are a finding if
they deviate from this configuration.
d555
/tcb
root
/tcb/files
d771
root
/tcb/files/auth
d771
root
/tcb/files/auth/[a-z]/*
664
sys
sys
sys
root
root
AIX.
# ls –lL /etc/ security/passwd
All Other Platforms
# ls –lL /etc/shadow
If the /etc/passwd and /etc/shadow (or equivalent) file is not owned by root, then this is a finding. If
HP-UX /tcb directories and files ownerships are not configured as detailed above, then this is a finding.
PDI:
GEN001400
V0000797
Category II
:
Status Code: AUTO
Previously:
G047
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
The /etc/passwd and /etc/shadow (or equivalent) file is not owned by
root.
Reference:
UNIX STIG: 3.4
15. GEN001420 – /etc/shadow File Permissions
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 76
Check /etc/shadow and equivalent file(s) permissions:
HP-UX
The TCB structure of HP-UX and other flavors of UNIX is radically different from the /etc/shadow
structure found in Solaris. The file permissions and uids/gids should be as follows, and are a finding if
they deviate from this configuration.
d555
/tcb
root
/tcb/files
d771
root
/tcb/files/auth
d771
root
/tcb/files/auth/[a-z]/*
664
sys
sys
sys
root
root
AIX.
# ls –lL /etc/ security/passwd
All Other Platforms
# ls –lL /etc/shadow
If the /etc/shadow (or equivalent) file is more permissive than 400, then this is a finding. If HP-UX /tcb
directories and files permissions are not configured as detailed above, then this is a finding.
PDI:
GEN00142 Category II
0
:
Status
Code:
AUTO
Previously:
G050
V0000800
MAC/Confidentiality Levels:
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
The /etc/shadow (or equivalent) file is more permissive than 400.
Reference:
UNIX STIG: 3.4
10. Home Directories
1. GEN001440 – Assign Home Directories
Perform:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 77
Solaris
# pwck
HP-UX
# pwck -s
AIX
# usrck –n ALL
IRIX
# pwck
Linux
# pwck
If any interactive users are not assigned a home directory, then this is a finding.
PDI:
GEN001440
Category:IV
Status Code: AUTO
Previously:
G051
V0000899
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
Users are not assigned a home directory in the /etc/passwd file.
Reference:
UNIX STIG: 3.5
2. GEN001460 – Assigned Home Directories Exist
Perform:
Solaris
# pwck
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 78
HP-UX
# pwck -s
AIX
# usrck –n ALL
IRIX
# pwck
Linux
# pwck
If an interactive user assigned home directories do not exist, then this is a finding.
PDI:
GEN001460
Category:IV
Status Code: AUTO
Previously:
G052
V0000900
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
A home directory defined in the /etc/passwd file does not exist.
Reference:
UNIX STIG: 3.5
3. GEN001480 –Home Directories Permissions
Issue this command for each user in the /etc/passwd file to display user home directory permissions:
# ls –lLd /<usershomedirectory>
If a user’s home directories are more permissive the 750, then this is a finding. Home directories with
permissions greater than 750 must be justified and documented with the IAO.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
GEN001480
V0000901
Page 79
Category II
:
Status Code: AUTO
Previously:
G053
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
User home directories are more permissive than 750.
Reference:
UNIX STIG: 3.5
4. GEN001500 –Home Directories Ownership
Issue this command for each user in the /etc/passwd file to display user home directory ownership:
# ls –lLd /<usershomedirectory>
If a user’s home directory(s) are not owned by the assigned user, then this is a finding. Home directories not
owned by the assigned user must be justified and documented with the IAO.
PDI:
GEN001500
V0000902
Category II
:
Status Code: AUTO
Previously:
G054
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
Users do not own their home directory.
Reference:
UNIX STIG: 3.5
5. GEN001520 –Home Directories Group Ownership
Issue this command for each user in the /etc/passwd file to display user home directory group ownership:
# ls –lLd /<usershomedirecotory>
# grep <user> /etc/group
If user home directories are not group owned by the assigned user’s primary group, then this is a finding. Home
directories with a group owner other than the assigned owner must be justified and documented with the IAO.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
GEN001520
V0000903
Page 80
Category II
:
Status Code: AUTO
Previously:
G055
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
Home directories are not group owned by the home directory owner’s
primary group. Exceptions may exist for application directories, which
will be documented with the IAO.
Reference:
UNIX STIG: 3.5
11. User Files
1. GEN001540 –Home Directories File Ownership
If non-startup files are found in a user’s home directory which are not owned by the user ask the SA or IAO if
these files are documented.
If user home directories contain files or directories not owned by the home directory owner without
documentation, then this is a finding.
PDI:
GEN001540
Category:III
Status Code: AUTO
Previously:
G067
V0000914
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
User home directories contain files/directories not owned by the home
directory owner.
Reference:
UNIX STIG: 3.6
2. GEN001560 – Home Directories File Permissions
If non-start-up files are found in a user’s home directory that have permissions less restrictive than 750, ask the
SA or IAO if these files are documented.
If user home directories contain files or directories more permissive than 750 without documentation, then this is
a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 81
GEN001560
Category:III
Status Code: AUTO
Previously:
G068
V0000915
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
User home directories contain files/directories more permissive than
750.
Reference:
UNIX STIG: 3.6
12. Run Control Scripts
1. GEN001580 – Run Control Scripts Permissions
Check run control scripts permissions:
Solaris
# cd /etc
# ls –lL rc*
# cd /etc/init.d
# ls –l
HP-UX
# cd /sbin
# ls –lL rc*
# cd /sbin/init.d
# ls –l
# /etc/rc.config.d
# ls -l
AIX
# cd /etc
# ls –lL rc*
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 82
IRIX
# cd /etc
# ls –lL rc*
# cd /etc/init.d
# ls –l
Linux
(may vary)
# cd /etc
# ls –lL rc*
# cd /etc/init.d
# ls –l
If run control scripts are more permissive than 755, then this is a finding.
PDI:
GEN001580
V0000906
Category II
:
Status Code: AUTO
Previously:
G058
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
Run control scripts are more permissive than 755.
Reference:
UNIX STIG: 3.7
2. GEN001600 – Run Control Scripts PATH Variable
Perform:
Solaris
# cd /etc/init.d
# grep PATH *
HP-UX
# cd /sbin/init.d
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 83
# grep PATH *
AIX
# cd /etc
# grep PATH rc*
IRIX
# cd /etc/init.d
# grep PATH *
Linux
(may vary)
# cd /etc
# grep PATH *
# cd /etc/init.d
# grep PATH */*
If the PATH variable has a ‘.’ or a ‘::’ , then this is a finding.
PDI:
GEN001600
V0000907
Category II
:
Status Code: AUTO
Previously:
G059
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSS-1, DCSS-2
PDI Description:
Run control scripts PATH variable contains a ‘.’ or a ‘::’, or starts or
ends with a ‘.’.
Reference:
UNIX STIG: 3.7
3. GEN001620 – Run Control Scripts SGID/SUID
Check run control scripts for sgid and suid :
Solaris
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 84
# cd /etc
# ls –lL rc*
# cd /etc/init.d
# ls –l
HP-UX
# cd /sbin
# ls –lL rc*
# cd /sbin/init.d
# ls –l
# /etc/rc.config.d
# ls -l
AIX
# cd /etc
# ls –lL rc*
IRIX
# cd /etc
# ls –lL rc*
# cd /etc/init.d
# ls –l
Linux
# cd /etc
(may vary)
# ls –lL rc*
# cd /etc/init.d
# ls –l
If run control scripts have the sgid or suid bit set, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
GEN001620
V0000909
Page 85
Category II
:
Status Code: AUTO
Previously:
G061
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
Run control scripts have the sgid or the suid bit set.
Reference:
UNIX STIG: 3.7
4. GEN001640 – Run Control Scripts World Writable Programs or Scripts
Perform more command to look in the system startup files to check for files or scripts being executed. Check
the permissions on the files or scripts to check if they are world writable. Alternatively, the command
#
find / -perm –0002 –type f > wwlist
Will give a list of world writable files that can be checked against the executed files or scripts. If world writeable
files are found to be executed from systems startup scripts, then this is a finding.
PDI:
GEN001640
V0000910
Category I
:
Status Code: AUTO
Previously:
G062
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
Run control scripts execute world writable programs or scripts.
Reference:
UNIX STIG: 3.7
5. GEN001660 – Run Control Scripts Ownership
Check run control scripts ownership :
Solaris
# cd /etc
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 86
# ls –lL rc*
# cd /etc/init.d
# ls –l
HP-UX
# cd /sbin
# ls –lL rc*
# cd /sbin/init.d
# ls –l
# /etc/rc.config.d
# ls -l
AIX
# cd /etc
# ls –lL rc*
IRIX
# cd /etc
# ls –lL rc*
# cd /etc/init.d
# ls –l
Linux
(may vary)
# cd /etc
# ls –lL rc*
# cd /etc/init.d
# ls –l
If run control scripts are not owned by root or bin, then this is a finding.
PDI:
GEN001660
V0004089
Category II
:
http://s3.amazonaws.com/0706/819143.html
Status Code: AUTO
Previously:
G611
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 87
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
Run control scripts are not owned by root or bin.
Reference:
UNIX STIG: 3.7
6. GEN001680 – Run Control Scripts Group Ownership
Check run control scripts group ownership :
Solaris
# cd /etc
# ls –lL rc*
# cd /etc/init.d
# ls –l
HP-UX
# cd /sbin
# ls –lL rc*
# cd /sbin/init.d
# ls –l
AIX
# cd /etc
# ls –lL rc*
IRIX
# cd /etc
# ls –lL rc*
# cd /etc/init.d
# ls –l
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 88
Linux
(may vary)
# cd /etc
# ls –lL rc*
# cd /etc/init.d
# ls –l rc*
If run control scripts are not group owned by root, sys, bin, other or the system default, then this is a finding.
PDI:
GEN001680
Category II
:
V0004090
Status Code: AUTO
Previously:
G612
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
Run control scripts are not group owned by root, sys, bin, other, or the
system default.
Reference:
UNIX STIG: 3.7
7. GEN001700 – Run Control Scripts Execute Programs
Perform:
Solaris
# cd /etc
# ls –lL rc*
# cd /etc/init.d
# ls –l
HP-UX
# cd /sbin
# ls –lL rc*
# cd /sbin/init.d
# ls –l
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 89
AIX
# cd /etc
# ls –lL rc*
IRIX
# cd /etc
# ls –lL rc*
# cd /etc/init.d
# ls –l
Linux
(may vary)
# cd /etc
# ls –lL rc*
# cd /etc/init.d
# ls –l rc*
Use the more command to search for programs executed by system start-up files. Then use the ls –l
command to examine the permissions of the program. In most cases, they will be owned by root, sys, or bin. In a
very small minority of cases, they may be owned by identifiable applications. In no case will applications be
owned by users.
PDI:
GEN001700
V0004091
Category II
:
Status Code: MAN++
Previously:
G613
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
Run control scripts execute programs owned by neither a system
account nor an application account.
Reference:
UNIX STIG: 3.7
13. Global Initialization Files
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 90
1. GEN001720 – Global Initialization Files Permissions
Check global initialization files permisions:
# ls –l /etc/.login
# ls –l /etc/profile
# ls –l /etc/bashrc
# ls –l /etc/environment
# ls –l /etc/security/environ
If global initialization files are more permissive than 644, then this is a finding.
PDI:
GEN001720
V0011981
Category II
:
Status Code: AUTO
Previously:
N/A
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
Global initialization files are more permissive than 644.
Reference:
UNIX STIG: 3.8.1
2. GEN001740 – Global Initialization Files Ownership
Check global initialization files ownership:
# ls –l /etc/.login
# ls –l /etc/profile
# ls –l /etc/bashrc
# ls –l /etc/environment
# ls –l /etc/security/environ
If global initialization files are not owned by root, then this is a finding.
PDI:
GEN001740
V0011982
Category II
:
http://s3.amazonaws.com/0706/819143.html
Status Code: AUTO
Previously:
N/A
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 91
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
Global initialization files are not owned by root.
Reference:
UNIX STIG: 3.8.1
3. GEN001760 – Global Initialization Files Group Ownership
Check global initialization files group ownership:
# ls –l /etc/.login
# ls –l /etc/profile
# ls –l /etc/bashrc
# ls –l /etc/environment
# ls –l /etc/security/environ
If global initialization files are not group owned by root, sys, bin, other, or the system default, then this is a
finding.
PDI:
GEN001760
V0011983
Category II
:
Status Code: AUTO
Previously:
N/A
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
Global initialization files are not group owned by root, sys, bin, other,
or the system default.
Reference:
UNIX STIG: 3.8.1
4. GEN001780 – Global Initialization Files do not Contain mesg -n
# grep “mesg -y ” /etc/.login
# grep “mesg -y ” /etc/profile
# grep “mesg -y ” /etc/bashrc
# grep “mesg -y ” /etc/environment
# grep “mesg -y ” /etc/security/environ
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 92
If global initialization files do contain mesg -y , then this is a finding.
PDI:
GEN001780
Category:III
Status Code: AUTO
Previously:
G112
V0000825
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSS-1, DCSS-2
PDI Description:
Global initialization files do not contain the command mesg –n.
Reference:
UNIX STIG: 3.8.1
5. GEN001800 – Default/Skeleton Dot Files Permissions
Check skeleton files permisions :
AIX.
# ls –l /etc/ security/.profile
All Other Platforms
# ls –alL /etc/skel
If skeleton dot files are more permissive than 644, then this is a finding.
PDI:
GEN001800
V0000788
Category II
:
Status Code: AUTO
Previously:
G038
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
Default skeleton . files are more permissive than 644.
Reference:
UNIX STIG: 3.8.1
6. GEN001820 – Default/Skeleton Dot Files Ownership
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 93
Check skeleton files ownership:
AIX.
# ls –l /etc/ security/.profile
All Other Platforms
# ls –alL /etc/skel
If skeleton dot files are not owned by root or bin, then this is a finding.
PDI:
GEN001820
V0011984
Category II
:
Status Code: AUTO
Previously:
N/A
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
Default skeleton . files are not owned by root or bin.
Reference:
UNIX STIG: 3.8.1
7. GEN001840 – Global Initialization Files PATH Variable
# more /etc/.login |grep PATH
# more /etc/profile | grep PATH
# more /etc/bashrc | grep PATH
# more /etc/environment | grep PATH
# more /etc/security/environ | grep PATH
If the global initialization files’ PATH variable contains a ‘.’ or a ‘::’, or starts or ends with a ‘:’, then this is a
finding.
PDI:
GEN001840
V0011985
Category II
:
http://s3.amazonaws.com/0706/819143.html
Status Code: AUTO
Previously:
N/A
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 94
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSS-1, DCSS-2
PDI Description:
Global initialization files PATH variable contains a ‘.’ or a ‘::’, or
starts or ends with a ‘:’.
Reference:
UNIX STIG: 3.8.1
14. Local Initialization Files
1. GEN001860 – Local Initialization Files Ownership
# ls –al / <usershomedirectory>/.login
# ls –al / <usershomedirectory>/.cschrc
# ls –al / <usershomedirectory>/.logout
# ls –al / <usershomedirectory>/.profile
# ls –al / <usershomedirectory>/.bash_profile
# ls –al / <usershomedirectory>/.bashrc
# ls –al / <usershomedirectory>/.bash_logout
# ls –al / <usershomedirectory>/.env
# ls –al / <usershomedirectory>/.dtprofile
# ls –al / <usershomedirectory>/.dispatch
# ls –al / <usershomedirectory>/.emacs
# ls –al / <usershomedirectory>/.exrc
If local initialization files are not owned the home directory user, then this is a finding. Local initialization files
not owned by the user must be justified and documented by the IAO.
PDI:
GEN001860
V0000904
Category II
:
Status Code: AUTO
Previously:
G056
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
Local initialization files are not owned by the user or root.
Reference:
UNIX STIG: 3.8.2
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 95
2. GEN001880 – Local Initialization Files Permissions
# ls –al / <usershomedirectory>/.login
# ls –al / <usershomedirectory>/.cschrc
# ls –al / <usershomedirectory>/.logout
# ls –al / <usershomedirectory>/.profile
# ls –al / <usershomedirectory>/.bash_profile
# ls –al / <usershomedirectory>/.bashrc
# ls –al / <usershomedirectory>/.bash_logout
# ls –al / <usershomedirectory>/.env
# ls –al / <usershomedirectory>/.dtprofile
(permissions should be 755)
# ls –al / <usershomedirectory>/.dispatch
# ls –al / <usershomedirectory>/.emacs
# ls –al / <usershomedirectory>/.exrc
If local initialization files are more permissive than 740 or the .dtprofile file is more permissive than 755, then
this is a finding.
PDI:
GEN001880
V0000905
Category II
:
Status Code: AUTO
Previously:
G057
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
Local initialization files are more permissive than 740.
.dt (a directory, this should have permissions of 755)
.dtprofile (a file, this should have permissions of 755)
Reference:
UNIX STIG: 3.8.2
3. GEN001900 – Local Initialization Files PATH Variable
# more / <usershomedirectory>/.* |grep PATH
If the local initialization files’ PATH variable contains a ‘.’ or a ‘::’, or starts or ends with a ‘:’, then this is a
finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
GEN001900
V0011986
Page 96
Category II
:
Status Code: AUTO
Previously:
N/A
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSS-1, DCSS-2
PDI Description:
Local initialization files PATH variable contains a ‘.’ or a ‘::’, or starts
with a ‘.’.
Reference:
UNIX STIG: 3.8.2
4. GEN001920 – Local Initialization Files SGID/SUID
# ls -la / <usershomedirectory>/.*
If any of the above files have the suid or sgid bit set, then this is a finding.
PDI:
GEN001920
V0000908
Category II
:
Status Code: AUTO
Previously:
G060
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
Local initialization f iles have the suid or the sgid bit set.
Reference:
UNIX STIG: 3.8.2
5. GEN001940 – Local Initialization Files World Writable Programs or Scripts
# more / <usershomedirectory>/.*
Look for programs or scripts executed within the local initialization files, and issue an ls -al on any programs
or scripts found to check if the called program or script is world writable.
If local initialization files execute world writable programs or scripts, then this is a finding.
PDI:
GEN001940
V0004087
Category II
:
Status Code: AUTO
Previously:
G609
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 97
IA Controls:
ECLP-1
PDI Description:
Local initialization files execute world writable programs or scripts.
Reference:
UNIX STIG: 3.8.2
6. GEN001960 – Local Initialization Files mesg -y
# grep “mesg y” / <usershomedirectory>/.*
If local initialization files contain the mesg –y or mesg y command, then this is a finding.
PDI:
GEN001960
Category:III
Status Code: AUTO
Previously:
G610
V0004088
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
Local initialization files contain the mesg -y or mesg y command.
Reference:
UNIX STIG: 3.8.2
15. Trusted System/System Access Control Files
1. GEN001980 – Plus (+) in Access Control Files
# find / -name .rhosts
# more /<directorylocation>/.rhosts
# find / -name .shosts
# more /<directorylocation>/.shosts
# find / -name hosts.equiv
# more /<directorylocation>/hosts.equiv
# find / -name shosts.equiv
# more /<directorylocation>/shosts.equiv
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 98
If the .rhosts, .shosts, hosts.equiv, shosts.equiv, /etc/passwd, /etc/shadow, and/or /etc/group files contain a plus
(+) that is not used to define entries for NIS+ netgroups, then this is a finding.
PDI:
GEN001980
V0011987
Category II
:
Status Code: AUTO
Previously:
N/A
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
The .rhosts, .shosts, hosts.equiv, shosts.equiv, /etc/passwd, /etc/
shadow, and/or /etc/group files contain a plus (+) and does not define
entries for NIS+ netgroups.
Reference:
UNIX STIG: 3.9
2. GEN002000 – The .netrc File Exists
# find / -name .netrc
If the .netrc file exists, then this is a finding. The .netrc must be justified and documented with the IAO.
PDI:
GEN002000
V0000913
Category II
:
Status Code: AUTO
Previously:
G066
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1, IAIA-2
PDI Description:
A .netrc file exists.
Reference:
UNIX STIG: 3.9
3. GEN002020 – Access Control Files Host Pairs
# find / -name .rhosts
# more /<directorylocation>/.rhosts
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 99
# find / -name .shosts
# more /<directorylocation>/.shosts
# find / -name hosts.equiv
# more /<directorylocation>/hosts.equiv
# find / -name shosts.equiv
# more /<directorylocation>/shosts.equiv
If the .rhosts, .shosts, hosts.equiv, or shosts.equiv files contain other than hostname-user pairs and are not
justified and documented with the IAO , then this is a finding.
PDI:
GEN002020
V0004427
Category II
:
Status Code: PART
Previously:
G614
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1, IAIA-2
PDI Description:
The .rhosts, .shosts, hosts.equiv, or shosts.equiv files contain other
than host-user pairs and are not justified and documented with the
IAO .
Reference:
UNIX STIG: 3.9
4. GEN002040 – Access Control Files Documentation
# find / -name .rhosts
# find / -name .shosts
# find / -name hosts.equiv
# find / -name shosts.equiv
If .rhosts, .shosts, hosts.equiv, or shosts.equiv are found and not justified and documented with the IAO, then
this is a finding.
PDI:
GEN002040
V0011988
Category I
:
Status Code: PART
Previously:
N/A
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1, IAIA-2
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 100
PDI Description:
The .rhosts, .shosts, hosts.equiv, or shosts.equiv are used and not
justified and documented with the IAO.
Reference:
UNIX STIG: 3.9
5. GEN002060 – Access Control Files Accessibility
# find / -name .rhosts
# ls -al /<directorylocation>/.rhosts
# find / -name .shosts
# ls -al /<directorylocation>/.shosts
# find / -name hosts.equiv
# ls -l /<directorylocation>/hosts.equiv
# find / -name shosts.equiv
# ls -l /<directorylocation>/shosts.equiv
# find / -name .netrc
# ls -l /<directorylocation>/.netrc
If the .rhosts, .shosts, hosts.equiv, or shosts.equiv files files have permissions greater than 700, then this is a
finding.
PDI:
GEN002060
V0004428
Category II
:
Status Code: AUTO
Previously:
G615
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
The .r hosts, .shosts, hosts.equiv, shosts.equiv, or .netrc files are
accessible by users other than root or the owner.
Reference:
UNIX STIG: 3.9
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 101
6. GEN002100 – The .rhosts Supported in PAM
Linux.
# cd /etc/pam.d
# grep rhosts_auth *
All Other Platforms
# grep rhosts_auth /etc/pam.conf
If rhosts_auth is found and is not documented as required, then this is a finding. This must be justified and
documented with the IAO.
PDI:
GEN002100
Category II
:
V0011989
Status Code: AUTO
Previously:
N/A
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
The .rhosts file is supported in PAM.
Reference:
UNIX STIG: 3.9
16. Shells
1. GEN002120 – The /etc/shells File Does Not Exist
AIX.
# ls –l /etc/security/login.cfg
All Other Platforms
# ls –l /etc/shells
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 102
If the /etc/shells (or equivalent) file does not exist , then this is a finding.
PDI:
GEN002120
Category II
:
V0000916
Status Code: AUTO
Previously:
G069
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
The /etc/shells (or equivalent) file does not exist.
Reference:
UNIX STIG: 3.10
2. GEN002140 – The /etc/shells Contents
AIX.
# more /etc/passwd
# more /etc/security/login.cfg
All Other Platforms
# more /etc/passwd
# more /etc/shells
Confirm the login shells referenced in the /etc/passwd file are listed in the /etc/shells (or equivalent)
file.
The /usr/bin/false, /bin/false, /dev/null, /sbin/nologin, (and equivalents), and sdshell , and application binaries will
be considered valid shells for use in the /etc/passwd file, but will not be listed in the /etc/shells file.
If a shell referenced in /etc/passwd is not listed in the shells file, excluding the above me ntioned shells, then this
is a finding.
PDI:
GEN002140
V0000917
Category II
:
Status Code: AUTO
Previously:
G070
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 103
PDI Description:
A shell referenced in /etc/passwd is not listed in the shells file.
Reference:
UNIX STIG: 3.10
3. GEN002160 – Shells SUID
AIX.
# more /etc/security/login.cfg
For each shell listed in the /etc/security/login.cfg file:
# ls –l <shell>
All Other Platforms
# find / -name “*sh”
For each shell found:
# ls –l <shell>
If shell files have the suid bit set, then this is a finding.
Note: The remsh command is sometimes linked to the rsh command and will have the suid bit set; in this
case it is not a finding. Determine if that is the case by using ls –li to determine if they share the same inode
number. The remsh command is the remote shell command and should not be considered a shell. Solaris
uses the /usr/bin/rsh and the /usr/ucb/rsh commands for remote shells, and they should also be
ignored here. A restricted shell also exists for bash (rbash).
PDI:
GEN002160
V0000919
Category I
:
Status Code: AUTO
Previously:
G072
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
PDI Description:
Reference:
ECLP-1
Shell files have the suid bit set.
UNIX STIG: 3.10
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 104
4. GEN002180 – Shells SGID
AIX.
# more /etc/security/login.cfg
For each shell listed in the /etc/security/login.cfg file:
# ls –l <shell>
All Other Platforms
# find / -name “*sh”
For each shell found:
# ls –l <shell>
If shell files have the sgid bit set, then this is a finding.
PDI:
GEN002180
Category II
:
V0000920
Status Code: AUTO
Previously:
G073
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
Shell files have the sgid bit set.
Reference:
UNIX STIG: 3.10
5. GEN002200 – Shells Ownership
AIX.
# more /etc/security/login.cfg
For each shell listed in the /etc/security/login.cfg file:
# ls –l <shell>
All Other Platforms
# find / -name “*sh”
For each shell found:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 105
# ls –l <shell>
If shell files are not owned by root or bin, then this is a finding.
PDI:
GEN002200
Category II
:
V0000921
Status Code: AUTO
Previously:
G074
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
Shell files are not owned by root or bin.
Reference:
UNIX STIG: 3.10
6. GEN002220 – Shells Permissions
AIX.
# more /etc/security/login.cfg
For each shell listed in the /etc/security/login.cfg file:
# ls –l <shell>
All Other Platforms
# find / -name “*sh”
For each shell found:
# ls –l <shell>
If shell files are more permissive than 755, then this is a finding.
PDI:
GEN002220
V0000922
Category II
:
Status Code: AUTO
Previously:
G075
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
PDI Description:
Reference:
ECLP-1
Shell files are more permissive than 755.
UNIX STIG: 3.10
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 106
17. Device Files
1. GEN002260 – System Baseline for Device Files Checking
# find / -type b
# find / -type c
# find / -type n
If the system is not checked weekly against the system baseline for extraneous device files, then this is a finding.
Ask the SA to show the previous weeks baseline of files.
PDI:
GEN002260
V0000923
Category III
:
Status Code: MAN
Previously:
G076
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
PDI Description:
Reference:
VIVM-1
The system is not checked weekly against the system baseline for
extraneous device files.
UNIX STIG: 3.11
2. GEN002280 – Device Files Directories Permissions
#
ls –al /dev
#
ls –al /devices (Solaris)
Check the permissions on the directories and subdirectories that contain device files.
If device file directories are writable by users other than a system account or as configured by the vendor, then
this is a finding.
PDI:
GEN002280
V0000924
Category II
:
Status Code: MAN
Previously:
G077
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 107
PDI Description:
Device file directories are writable by users other than a system
account or as configured by the vendor.
Reference:
UNIX STIG: 3.11
3. GEN002300 – Device Files Ownership
Attempt to determine if any backup devices exist for the system. Some systems will have a file containing the
default device files (such as /etc/default/ tar on Solaris). Others can be checked via a system
administration GUI (such as SAM on HP-UX). If backup device files exist ask the SA or IAO if the file(s) are
documented with the IAO. .
PDI:
GEN002300
Category II
:
V0000925
Status Code: PART
Previously:
G078
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSD-1, ECCD-1, ECCD-2
PDI Description:
Device files used for backup are writable by users other than root or a
pseudo backup user.
Reference:
UNIX STIG: 3.11
4. GEN002320 – Audio Device Permissions
SOLARIS
# ls –lL /dev/audio
HP-UX
# /usr/sbin/ioscan –f
# ls –lL <audio device file>
AIX
# /usr/sbin/lsdev –C | grep –I audio
#
ls –lL /dev/*aud0
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 108
IRIX
# ls –lL /dev/audio
Linux
# ls -lL /dev/audio*
If the permissions are greater than 644, then this is a finding.
PDI:
GEN002320
Category II
:
V0001048
Status Code: AUTO
Previously:
G501
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
An audio device is more permissive than 644.
Reference:
UNIX STIG: 3.11
5. GEN002340 – Audio Device Ownership
SOLARIS
# ls –lL /dev/audio
HP-UX
# /usr/sbin/ioscan –f
# ls –lL <audio device file>
AIX
# /usr/sbin/lsdev –C | grep –I audio
#
ls –lL /dev/*aud0
IRIX
# ls –lL /dev/audio
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 109
Linux
# ls -lL /dev/audio*
If the audio device is not owned by root, then this is a finding.
PDI:
GEN002340
Category II
:
V0001049
Status Code: AUTO
Previously:
G502
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
An audio device is not owned by root.
Reference:
UNIX STIG: 3.11
6. GEN002360 – Audio Device Group Ownership
SOLARIS
# ls –lL /dev/audio
HP-UX
# /usr/sbin/ioscan –f
# ls –lL <audio device file>
AIX
# /usr/sbin/lsdev –C | grep –I audio
#
ls –lL /dev/*aud0
IRIX
# ls –lL /dev/audio
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 110
Linux
# ls -lL /dev/audio*
If the audio device group ownership is not root, sys, bin, or audio, then this is a finding.
PDI:
GEN002360
V0001061
Category II
:
Status Code: AUTO
Previously:
G504
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
Reference:
An audio device is not group owned by root, sys, or bin.
UNIX STIG: 3.11
18. Set User ID (suid)
1. GEN002380 – SUID Files Baseline
# find / perm –4000 | more
If the ownership, permissions, and location of files with the suid bit set are not baselined with the IAO, then this
is a finding.
PDI:
GEN002380
V0000801
Category II
:
Status Code: PART
Previously:
G082
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
PDI Description:
Reference:
ECLP-1
The ownership, permissions, and location of files with the suid bit set
are not documented with the IAO .
UNIX STIG: 3.12.1
2. GEN002400 – System Baseline for SUID Files Checkling
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 111
# find / perm –4000 |more
If the system is not checked weekly against the system baseline for unauthorized suid files as well as
unauthorized modification to authorized suid files, then this is a finding.
PDI:
GEN002400
V0000803
Category II
:
Status Code: PART
Previously:
G084
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
VIVM-1
PDI Description:
The system is not checked weekly against the system baseline for
unauthorized suid files as well as unauthorized modification to
authorized suid files.
Reference:
UNIX STIG: 3.12.1
3. GEN002420 – File Systems Mounted With nosuid
# mount | grep –v nosuid
Confirm all NFS mounts, floppy & CD drives, and user file systems (e.g., /export/home or /usr/home )
are configured with the nosuid option.
If user file systems, removable media, or remote file systems that do not require suid/sgid files are not mounted
with the nosuid option invoked, then this is a finding.
PDI:
GEN002420
V0000805
Category II
:
Status Code: PART
Previously:
G086
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
User file systems, removable media, or remote file systems are not
mounted with the nosuid option invoked.
Reference:
UNIX STIG: 3.12.1
19. Set Group ID (sgid)
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 112
1. GEN002440 – SGID Files Baseline
# find / perm –2000 |more
If the ownership, permissions, and location of files with the suid bit set are not baselined with the IAO, then this
is a finding.
PDI:
GEN002440
V0000802
Category II
:
Status Code: PART
Previously:
G083
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The ownership, permissions, and location of files with the suid bit set
are not documented with the IAO
Reference:
UNIX STIG: 3.12.1
2. GEN002460 – System Baseline for SGID Files Checking
# find / perm –2000 |more
If the system is not checked weekly against the system baseline for unauthorized sgid files as well as
unauthorized modification to authorized sgid files, then this is a finding.
PDI:
GEN002460
V0000804
Category II
:
Status Code: PART
Previously:
G085
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
VIVM-1
PDI Description:
The system is not checked weekly against the system baseline for
unauthorized sgid files as well as unauthorized modification to
authorized sgid files.
Reference:
UNIX STIG: 3.12.2
20. Sticky Bit
1. GEN002480 – World Writable Files and Directories
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 113
# find / -type f -perm -002 |more
If there are world writable files, then this is a finding.
# find / -type d -perm -002 |more
If there are world writable directories that are not public directories (e.g., /tmp), then this is a finding.
PDI:
GEN002480
V0001010
Category II
:
Status Code: PART
Previously:
G079
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
There are world writable files or world writable directories that are not
public directories.
Reference:
UNIX STIG: 3.12.3
2. GEN002500 – Sticky Bit on Public Directories
# find / -type d -perm -002 ! –perm -1000 |more
If the sticky bit is not set on public directories, then this is a finding.
PDI:
GEN002500
Category:III
Status Code: PART
Previously:
G087
V0000806
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2, ECLP-1
PDI Description:
The sticky bit is not set on public directories.
Reference:
UNIX STIG: 3.12.3
3. GEN002520 – Public Directories Ownership
# find / -type d \( -perm -002 -a –perm –1000 \) |more
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 114
If public directories are not owned by root or an application user, then this is a finding.
PDI:
GEN002520
Category II
:
V0000807
Status Code: PART
Previously:
G088
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
Public directories are not owned by root or an application user.
Reference:
UNIX STIG: 3.12.3
4. GEN002540 – Public Directories Group Ownership
# find / -type d \( -perm -002 -a –perm –1000 \) |more
If public directories are not group owned by root, sys, bin, or an application group, then this is a finding.
PDI:
GEN002540
Category:II
Status Code: MAN
Previously:
N/A
V0011990
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
Public directories are not group owned by root, sys, bin, or an
application group.
Reference:
UNIX STIG: 3.12.3
21. Umask
1. GEN002560 – Default umask
AIX
# /usr/sbin/lsuser –a umask ALL | more
All other platforms
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 115
Global Initialization Files
# grep umask /etc/*
Confirm the global initialization files set the umask to 077.
Local Initialization Files
# grep umask / <usershomedirectory>/.*
Confirm the local initialization files do not exceed the default umask to 077.
Note: If the default umask is 000 or allows for the creation of world writable files this becomes a Severity Code I
finding.
If the system and user default umask is not 077, then this a finding.
PDI:
GEN002560
V0000808
Category II
:
Status Code: PART
Previously:
G089
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
The system and user default umask is not 077.
Reference:
UNIX STIG: 3.13
2. GEN002580 – Permissive umask Documentation
AIX
# /usr/sbin/lsuser –a umask ALL | more
Local Initialization Files
# grep umask / <usershomedirectory>/.*
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 116
If an application has a umask less restrictive than 077, ask the SA or IAO if it is an application requirement and
ask to see the documentation. Note, however, that it is well known that Oracle requires a umask of 022. In that
case, or a similar one, this would not be a finding if it is documented with the IAO.
PDI:
GEN002580
V0000809
Category III
:
Status Code: MAN
Previously:
G090
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
Applications requiring an umask more permissive than 077 are not
justified and documented with the IAO.
Reference:
UNIX STIG: 3.13
22. Development Systems
1. GEN002600 – Development Systems Security Requirements
Ask the SA if the system being evaluated is a development system. If the system is utilized for development, ask
the SA if the same security standards are applied to both the development and production systems. If the same
security standards are not applied to both development and production systems, then this is a finding.
PDI:
GEN002600
Category:II
Status Code: MAN
Previously:
N/A
V0011991
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
The development system is not subject to the same security
requirements as production systems.
Reference:
UNIX STIG: 3.14
23. Default Accounts
1. GEN002640 – Disabled Default System Accounts
To determine if default system accounts such as those for sys, bin, uucp, nuucp, daemon, smtp, etc., have been
disabled perform the following:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 117
Solaris
# grep “*LK*” /etc/shadow
HP-UX
# grep u_lock /tcb/files/auth/b/bin
Repeat for other system accounts.
AIX
#
grep account_locked /etc/security/user
IRIX
#
grep “*LK*” /etc/passwd
Linux
#
awk –F: ‘$2 == “*” {print $0}’ /etc/shadow
If there are any default system accounts that are not locked or have false for a shell, then this is a finding.
PDI:
GEN002640
Category:II
Status Code: MAN
Previously:
G092
V0000810
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1, IAIA-2, IAAC-1
PDI Description:
Default accounts have not been disabled.
Reference:
UNIX STIG: 3.15
24. Audit Requirements
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 118
1. GEN002660 – Configure and Implement Auditing
Perform the following to determine if auditing is enabled:
Solaris
# ps –ef |grep auditd
HP-UX
# audsys
AIX
#
/usr/sbin/audit query | head -1
IRIX
#
chkconfig audit
Linux
#
ps –ef |grep auditd
If the auditd process is not found, then this is a finding.
PDI:
GEN002660
V0000811
Category II
:
Status Code: AUTO
Previously:
G093
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECAN-1, ECAT-1, ECAT-2
PDI Description:
Auditing is not implemented.
Reference:
UNIX STIG: 3.16
2. GEN002680 – Audit Logs Accessiblity
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 119
Perform the following to determine the location of audit logs and then check the ownership:
Solaris
# more /etc/security/audit_control
# ls –lLd <audit log dir>
HP-UX
# ls –la /.secure/etc/*
AIX
#
grep “:bin:” /etc/security/audit/config
Directories to search will be listed under the bin stanza.
#
ls –la <audit directories>
IRIX
#
ls –la /var/adm/sat
Linux
#
ls –la /var/log/audit.d
# ls –la /var/log/audit/audit.log
If any of the audit log file s are readable by unprivileged id’s, then this is a finding.
PDI:
GEN002680
V0000812
Category II
:
Status Code: AUTO
Previously:
G094
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECTP-1
PDI Description:
System audit logs are readable by unauthorized users.
Reference:
UNIX STIG: 3.16
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 120
3. GEN002700 – Audit Logs Permissions
Perform the following to determine the location of audit logs and then check the permissions:
Solaris
# more /etc/security/audit_control
# ls –la <audit log dir>
HP-UX
# ls –la /.secure/etc
AIX
#
grep “:bin:” /etc/security/audit/config
Directories to search will be listed under the bin stanza.
#
ls –la <audit directories>
IRIX
#
ls –la /var/adm/sat
Linux
#
ls –la /var/log/audit.d
# ls –la /var/log/audit/audit.log
If any of the audit log file permissions are greater than 640, then this is a finding.
PDI:
GEN002700
V0000813
Category II
:
Status Code: AUTO
Previously:
G095
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECTP-1
PDI Description:
System audit logs are more permissive than 640.
Reference:
UNIX STIG: 3.16
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 121
4. GEN002720 – Audit Failed File and Program Access Attempts
Solaris
# more /etc/security/audit_control
Confirm flags –fr or fr is configured.
HP-UX
#
grep –i “audevent_args1” /etc/rc.config.d/auditing \
| grep open
AIX
#
more /etc/security/audit/events
Confirm the following events are configured:
FILE_Open
IRIX
#
sat_select |egrep “sat_access_denied|sat_access_failed”
Linux
For LAUS:
#
grep “@open-ops” /etc/audit/filter.conf
For auditd:
# grep “-a exit,always –S open –F success!=0” /etc/audit.rules
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 122
GEN002720
Category:II
Status Code: AUTO
Previously:
G100-G106
V0000814
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECAR-2
PDI Description:
The audit system is not configured to audit failed attempts to access
files and programs.
Reference:
UNIX STIG: 3.16
5. GEN002740 – Audit File and Program Deletion
Solaris
# grep flags /etc/security/audit_control
Confirm flags fd or +fd and -fd is configured.
HP-UX
#
grep –i “audevent_args1” /etc/rc.config.d/auditing \
| grep delete
AIX
#
more /etc/security/audit/events
Confirm the following events are configured:
FILE_Unlink, FS_Rmdir
IRIX
#
sat_select |grep “sat_file_crt_del”
Linux
For LAUS:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 123
#
grep “@rmdir-ops” /etc/audit/filter.conf
#
grep “@unlink-ops” /etc/audit/filter.conf
For auditd:
# grep “-a exit,always –S unlink –S rmdir” /etc/audit.rules
PDI:
GEN002740
Category:II
Status Code: AUTO
Previously:
G100-G106
V0000815
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECAR-2
PDI Description:
The audit system is not configured to audit files and programs deleted
by the user.
Reference:
UNIX STIG: 3.16
6. GEN002760 – Audit Administrative, Privileged, and Security Actions
Solaris 2.5 through 9
# grep flags /etc/security/audit_control
Confirm flags ad or +ad and -ad is configured.
Solaris 10 and some prior versions of 8 and 9
# grep flags /etc/security/audit_control
Confirm am or +am and -am is configured.
HP-UX
#
grep –i “audevent_args1” /etc/rc.config.d/auditing \
| grep admin
#
grep –i “audevent_args1” /etc/rc.config.d/auditing \
| grep removable
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 124
AIX
#
more /etc/security/audit/events
Confirm the following events are configured:
ACCT_Disable, ACCT_Enable, AUD_it, BACKUP_Export, DEV_Change, DEV_Configure, DEV_Create,
FILE_Chpriv, FILE_Fchpriv, FILE_Mknod, FILE_Owner, FS_Chroot, FS_Mount, FS_Umount,
PASSWORD_Check, PROC_Adjtime,PROC_Kill, PROC_Privilege, PROC_Setpgid, PROC_SetUserIds,
RESTORE_Import, TCBCK_Delete, USER_Change, USER_Create, USER_Reboot, USER_Remove, and
USER_SetEnv
IRIX
#
sat_select |egrep “sat_ae_mount|sat_sysacct|sat_checkpriv”
Linux
For LAUS:
#
#
grep “@priv-ops” /etc/audit/filter.conf
grep “@mount-ops” /etc/audit/filter.conf
#
grep “@system-ops” /etc/audit/filter.conf
For auditd the following should be present in /etc/audit.rules:
-w /var/log/audit/
-w /etc/auditd.conf
-w /etc/audit.rules
-a exit,always –S stime –S acct –S reboot –S swapon
-a exit,always –S settimeofday –S setrlimit –S setdomainname
-a exit, always –S sched_setparam –S sched_setscheduler
PDI:
GEN002760
Category:II
Status Code: AUTO
Previously:
G100-G106
V0000816
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECAR-2
PDI Description:
The audit system is not configured to audit all administrative,
privileged, and security actions.
Reference:
UNIX STIG: 3.16
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 125
7. GEN002800 – Audit Login, Logout, and Session Initiation
Solaris
# egrep “flags|naflags” /etc/security/audit_control
Confirm flags lo or +lo and -lo is configured.
Confirm naflags lo or +lo and –lo is configured.
HP-UX
#
grep –i “audevent_args1” /etc/rc.config.d/auditing \
| grep login
AIX
#
more /etc/security/audit/events
Confirm the following events are configured:
USER_Login, USER_Logout, INIT_Start, INIT_End and USER_SU
IRIX
#
sat_select |grep sat_ae_identity
Linux
For LAUS:
#
grep process-login /etc/audit/filter.conf |grep always
For auditd:
This is not a finding. Auditd enables this by default in the source code.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 126
GEN002800
Category:II
Status Code: AUTO
Previously:
G100-G106
V0000818
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECAR-2
PDI Description:
The audit system is not configured to audit login, logout, and session
initiation.
Reference:
UNIX STIG: 3.16
8. GEN002820 – Audit D iscretionary Access Control Permission Modifications
Solaris
# grep flags /etc/security/audit_control
Confirm flags fm or +fm and -fm is configured.
HP-UX
#
grep –i “audevent_args1” /etc/rc.config.d/auditing \
# | grep moddac
AIX
#
more /etc/security/audit/events
Confirm the following events are configured:
FILE_Acl, FILE_Fchmod, FILE_Fchown, FILE_Mode and
FILE_Owner
IRIX
#
#
sat_select |grep sat_fd_attr_write
sat_select |grep sat_file_attr_write
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 127
Linux
For LAUS:
#
#
grep “@mode-ops” /etc/audit/filter.conf
grep “@owner-ops” /etc/audit/filter.conf
For auditd the following system calls should be present in /etc/audit.rules:
-a exit,always –S chmod –S fchmod –S chown –S chown32 –S fchown
-a exit,always –S fchown32 –S lchown –S lchown32
PDI:
GEN002820
Category:II
Status Code: AUTO
Previously:
G100-G106
V0000819
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECTP-1
PDI Description:
The audit system is not configured to audit all d iscretionary access
control permission modifications.
Reference:
UNIX STIG: 3.16
9. GEN002860 – Audit Logs Rotation
Perform the following to search the crontab for entries to rotate the audit logs.
#
crontab –l
If a program can be located, this is not a finding. Otherwise, query the SA. If there is one that is demonstrable
(and runs automatically), this is not a finding. If the SA runs it manually, it is still a finding, because if the SA is
not there, it will not be accomplished. If the audit output is not archived daily, to tape or disk, this is a finding.
This can be ascertained by looking at the audit log directory and, if more than one file is there, or if the file does
not have today’s date, this is a finding.
PDI:
GEN002860
V0004357
Category II
:
Status Code: AUTO
Previously:
G674
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 128
IA Controls:
ECTP-1
PDI Description:
Audit logs are not rotated daily.
Reference:
UNIX STIG: 3.16
10. GEN002900 – Audit Data Retention
Ask the SA or the IAO if audit data is retained for at least one year or five years for SAMI audit data. If it is not,
then this is a finding.
PDI:
GEN002900
V0011992
Category III
:
Status Code: MAN
Previously:
N/A
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECRR-1
PDI Description:
Audit data is not retained at least one year or SAMI audit data for five
years.
Reference:
UNIX STIG: 3.16
11. GEN002920 – Audit Data Backup
Ask the SA if audit logs and records are backed up onto a different system or offline media on at least a weekly
basis. If it is not, then this is a finding. This check only pertains to audit logs. If a full operating system backup
is completed weekly which contains all of the audit logs, then this is not a finding.
PDI:
GEN002920V001204 Category III
8
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECTB-1
PDI Description:
Audit data is not backed up onto a different system or backup
media on at least a weekly basis.
Reference:
UNIX STIG: 3.16
25. Audit Review Guidance
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 129
1. GEN002940 – Audit Logs Review
Ask the IAO if audit files are reviewed daily for requirements stated in the Unix STIG. If the audit files are not
reviewed daily, then this is a finding.
PDI:
GEN002940V001199 Category II
3
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECAT-1, ECAT-2
PDI Description:
Audit trails and/or system logs are not reviewed on a daily basis
for:
Excessive logon attempt failures by single or multiple users
Logons at unusual/non-duty hours
Failed attempts to access restricted system or data files
indicating a possible pattern of deliberate browsing
Unusual or unauthorized activity by System Administrators
Command-line activity by a user that should not have that
capability
System failures or errors
Unusual or suspicious patterns of activity
Reference:
UNIX STIG: 3.16.1
26. Cron Restrictions
1. GEN002960 – Cron Utility Accessibility
Verify the cron.allow and cron.deny files exist:
Solaris
# ls –lL /etc/cron.d/cron.allow
# ls –lL /etc/cron.d/cron.deny
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 130
HP-UX
# ls –lL /var/adm/cron/cron.allow
# ls –lL /var/adm/cron/cron.deny
AIX
# ls –lL /var/adm/cron/cron.allow
# ls –lL /var/adm/cron/cron.deny
IRIX
# ls –lL /etc/cron.d/cron.allow
# ls –lL /etc/cron.d/cron.deny
Linux
Red Hat
# ls –lL /etc/cron.allow
# ls –lL /etc/cron.deny
Or
SuSE
# ls –lL /var/spool/cron/allow
# ls –lL /var/spool/cron/deny
If the cron.allow or cron.deny files do exist, then this is a finding.
PDI:
GEN002960
V0000974
Category II
:
Status Code: AUTO
Previously:
G200
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
PDI Description:
Reference:
ECPA-1
Access to the cron utility is not controlled via the cron.allow and/or
cron.deny file(s).
UNIX STIG: 3.17.3
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 131
2. GEN002980 – The cron.allow Permissions
Solaris
# ls –lL /etc/cron.d/cron.allow
HP-UX
# ls –lL /var/adm/cron/cron.allow
AIX
# ls –lL /var/adm/cron/cron.allow
IRIX
# ls –lL /etc/cron.d/cron.allow
Linux
Red Hat
# ls –lL /etc/cron.allow
Or
SuSE
# ls –lL /var/spool/cron/allow
If the cron.allow file is more permissive than 600, then this is a finding.
PDI:
GEN002980
V0000975
Category II
:
Status Code: AUTO
Previously:
G201
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The cron.allow file is more permissive than 600.
Reference:
UNIX STIG: 3.17.3
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 132
3. GEN003000 – Cron Executes World Writable Programs
The following lists the directories to search for cron jobs:
Solaris
# ls /var/spool/cron/crontabs/
HP-UX
# ls /var/spool/cron/crontabs/
AIX
# ls /var/spool/cron/crontabs/
IRIX
# ls /var/spool/cron/crontabs/
Linux
# ls /var/spool/cron/
# ls /etc/cron.d/
# ls /etc/crontab
# ls /etc/cron.daily/
# ls /etc/cron.hourly/
# ls /etc/cron.monthly/
# ls /etc/cron.weekly/
If cron jobs exist under any of the above directories, use the following command to search for programs executed
by at:
#
more <cron job file>
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 133
Perform a lo ng listing of each program file found in the cron file to determine if the file is world writeable.
#
ls –la <cron program file>
If cron executes world writeable files, then this is a finding.
PDI:
GEN003000
V0000976
Category II
:
Status Code: AUTO
Previously:
G203
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSL-1
PDI Description:
Cron executes group or world writable programs.
Reference:
UNIX STIG: 3.17.3
4. GEN003020 – Cron Executes Programs in World Writable Directories
The following lists the directories to search for cron jobs:
Solaris
# ls /var/spool/cron/crontabs/
HP-UX
# ls /var/spool/cron/crontabs/
AIX
# ls /var/spool/cron/crontabs/
IRIX
# ls /var/spool/cron/crontabs/
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 134
Linux
# ls /var/spool/cron/
# ls /etc/cron.d/
# ls /etc/crontab
# ls /etc/cron.daily/
# ls /etc/cron.hourly/
# ls /etc/cron.monthly/
# ls /etc/cron.weekly/
If cron jobs exist under any of the above directories, use the following command to search for programs executed
by at:
#
more <cron job file>
Perform a long listing of each program file ’s parent directory found in the cron file to determine if the directory
is world writeable.
#
ls –la <cron program file directory>
If cron executes programs in world writeable directories, then this is a finding.
PDI:
GEN003020V000097 Category:II
7
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G204
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSL-1
PDI Description:
Cron executes programs in or subordinate to world writable
directories.
Reference:
UNIX STIG: 3.17.3
5. GEN003040 – Crontabs Ownership
Perform the following to view the crontab ownership:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 135
Solaris
# ls –lL /var/spool/cron/crontabs/
HP-UX
# ls –lL /var/spool/cron/crontabs/
AIX
# ls –lL /var/spool/cron/crontabs/
IRIX
# ls –lL /var/spool/cron/crontabs/
Linux
# ls –lL /var/spool/cron/
# ls –lL /etc/cron.d/
# ls –lL /etc/crontab
# ls –lL /etc/cron.daily/
# ls –lL /etc/cron.hourly/
# ls –lL /etc/cron.monthly/
# ls –lL /etc/cron.weekly/
If the file is not owned by root or the creating user account, then this is a finding.
PDI:
GEN003040
V0011994
Category II
:
Status Code: AUTO
Previously:
N/A
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSL-1
PDI Description:
Crontabs are not owned by root or the crontab creator.
Reference:
UNIX STIG: 3.17.3
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 136
6. GEN003060 – Default System Accounts and Cron
Check for default system accounts in the following:
Solaris
# more /etc/cron.d/cron.allow
HP-UX
# more /var/adm/cron/cron.allow
AIX
# more /var/adm/cron/cron.allow
IRIX
# more /etc/cron.d/cron.allow
Linux
Red Hat
# more /etc/cron.allow
Or
SuSE
# more /var/spool/cron/allow
Default accounts (such as bin, sys, adm, and others) will not be listed in the cron.allow file or this will be a
finding.
PDI:
GEN003060
V0011995
Category II
:
Status Code: AUTO
Previously:
N/A
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECPA-1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 137
PDI Description:
Default system accounts (with the possible exception of root) are listed
in the cron.allow file or excluded from the cron.deny file if cron.allow
does not exist.
Reference:
UNIX STIG: 3.17.3
7. GEN003080 – Crontab files Permissions
Solaris
# ls –lL /var/spool/cron/crontabs/
HP-UX
# ls –lL /var/spool/cron/crontabs/
AIX
# ls –lL /var/spool/cron/crontabs/
IRIX
# ls –lL /var/spool/cron/crontabs/
Linux
# ls –lL /var/spool/cron/
# ls –lL /etc/cron.d/
# ls –lL /etc/crontab
# ls –lL /etc/cron.daily/
# ls –lL /etc/cron.hourly/
# ls –lL /etc/cron.monthly/
# ls –lL /etc/cron.weekly/
( Permissions of 600)
( Permissions of 600)
(Permissions of 600)
(Permissions of 700)
(Permissions of 700)
(Permissions of 700)
(Permissions of 700)
If crontab files are more permissive than 600 (700 for some Linux files), then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
GEN003080
V0000978
Page 138
Category II
:
Status Code: AUTO
Previously:
G205
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
Crontab files are more permissive than 600 (700 for some Linux files).
Reference:
UNIX STIG: 3.17.3
8. GEN003100 – Cron and Crontab Directories Permissions
Solaris
# ls –ld /var/spool/cron/crontabs
HP-UX
# ls –ld /var/spool/cron/crontabs
AIX
# ls –ld /var/spool/cron/crontabs
IRIX
# ls –ld /var/spool/cron/crontabs
Linux
# ls –ld /var/spool/cron
# ls –ld /etc/cron.d
# ls –ld /etc/cron.daily
# ls –ld /etc/cron.hourly
# ls –ld /etc/cron.monthly
# ls –ld /etc/cron.weekly
If the cron or crontab directories are more permissive than 755, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
GEN003100
V0000979
Page 139
Category II
:
Status Code: AUTO
Previously:
G206
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The cron or crontab directories are more permissive than 755.
Reference:
UNIX STIG: 3.17.3
9. GEN003120 – Cron and Crontab Directories Ownership
Solaris
# ls –ld /var/spool/cron/crontabs
HP-UX
# ls –ld /var/spool/cron/crontabs
AIX
# ls –ld /var/spool/cron/crontabs
IRIX
# ls –ld /var/spool/cron/crontabs
Linux
# ls –ld /var/spool/cron
# ls –ld /etc/cron.d
# ls –ld /etc/cron.daily
# ls –ld /etc/cron.hourly
# ls –ld /etc/cron.monthly
# ls –ld /etc/cron.weekly
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 140
If the cron or crontab directories are not owned by root or bin, then this is a finding.
PDI:
GEN003120
V0000980
Category II
:
Status Code: AUTO
Previously:
G207
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The cron or crontab directories are not owned by root or bin.
Reference:
UNIX STIG: 3.17.3
10. GEN003140 – Cron and Crontab Directories Group Ownership
Solaris
# ls –ld /var/spool/cron/crontabs
HP-UX
# ls –ld /var/spool/cron/crontabs
AIX
# ls –ld /var/spool/cron/crontabs
IRIX
# ls –ld /var/spool/cron/crontabs
Linux
# ls –ld /var/spool/cron
# ls –ld /etc/cron.d
# ls –ld /etc/cron.daily
# ls –ld /etc/cron.hourly
# ls –ld /etc/cron.monthly
# ls –ld /etc/cron.weekly
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 141
If the cron or crontab directories are not group owned by root, sys, or bin, then this is a finding.
PDI:
GEN003140
V0000981
Category II
:
Status Code: AUTO
Previously:
G208
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The cron or crontab directories are not group owned by root, sys, or bin.
Reference:
UNIX STIG: 3.17.3
11. GEN003160 – Cron Logging
Perform the following to check for cron logging:
Solaris
# ls –lL /var/cron/log
#
more /etc/default/cron
CRONLOG=YES
If this line does not exist, this is a finding.
HP-UX
# ls –lL /var/adm/cron/log
Cron is logged by default.
AIX
# ls –lL /var/adm/cron/log
Cron is logged by default.
IRIX
# ls –lL /var/cron/log
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 142
Linux
Cron logging is controlled by the syslog on Linux:
#
grep cron* /etc/syslog.conf
Red Hat
# ls –lL /var/log/cron
SuSE
# ls –lL /var/log/messages
If an entry for cron is not found, then this is a finding.
PDI:
GEN003160
V0000982
Category II
:
Status Code: AUTO
Previously:
G209
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECAT-1, ECAT-2, DCCS-1, DCCS-2
PDI Description:
Cron logging is not implemented.
Reference:
UNIX STIG: 3.17.3
12. GEN003180 – Cronlog Permissions
Solaris
# ls –lL /var/cron/log
HP-UX
# ls –lL /var/adm/cron/log
AIX
# ls –lL /var/adm/cron/log
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 143
IRIX
# ls –lL /var/cron/log
Linux
Red Hat
# ls –lL /var/log/cron
SuSE
# ls –lL /var/log/messages
If the cronlog file is more permissive than 600, then this is a finding.
PDI:
GEN003180
V0000983
Category II
:
Status Code: AUTO
Previously:
G210
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The cronlog file is more permissive than 600.
Reference:
UNIX STIG: 3.17.3
13. GEN003200 – cron.deny Permissions
Solaris
# ls –lL /etc/cron.d/cron.deny
HP-UX
# ls –lL /var/adm/cron/cron.deny
AIX
# ls –lL /var/adm/cron/cron.deny
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 144
IRIX
# ls –lL /etc/cron.d/cron.deny
Linux
Red Hat
# ls –lL /etc/cron.deny
Or
SuSE
# ls –lL /var/spool/cron/deny
If the cron.deny file is more permissive than 600 , then this is a finding.
PDI:
GEN003200
V0004358
Category II
:
Status Code: AUTO
Previously:
G620
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The cron.deny file is more permissive than 600.
Reference:
UNIX STIG: 3.17.3
14. GEN003220 – Cron Programs umask
Perform the following to check for cron jobs:
Solaris
# ls –lL /var/spool/cron/crontabs
HP-UX
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 145
# ls –lL /var/spool/cron/crontabs
AIX
# ls –lL /var/spool/cron/crontabs
IRIX
# ls –lL /var/spool/cron/crontabs
Linux
# ls –lL /var/spool/cron
# ls –lL /etc/cron.d
# ls –lL /etc/cron.daily
# ls –lL /etc/cron.hourly
# ls –lL /etc/cron.monthly
# ls –lL /etc/cron.weekly
Determine if there are any cron jobs by viewing a long listing of the directory. If there are cron jobs perform the
following to check for any programs that may have a umask more permissive than 077:
#
grep umask ./*
If there are any, this is a finding unless the IAO has justifying documentation. If there are no cron jobs present,
this vulnerability is Not Applicable.
PDI:
GEN003220
Category:III
Status Code: PART
Previously:
G621
V0004360
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1, DCSD-1
PDI Description:
Cron programs set the umask more permissive than 077 and these are
not justified and documented with the IAO.
Reference:
UNIX STIG: 3.17.3
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 146
15. GEN003240 – cron.allow Ownership
Solaris
# ls –lL /etc/cron.d/cron.allow
HP-UX
# ls –lL /var/adm/cron/cron.allow
AIX
# ls –lL /var/adm/cron/cron.allow
IRIX
# ls –lL /etc/cron.d/cron.allow
Linux
Red Hat
# ls –lL /etc/cron.allow
Or
SuSE
# ls –lL /var/spool/cron/allow
If the cron.allow file is not owned and group owned by root, sys, or bin, then this is a finding.
PDI:
GEN003240
V0004361
Category II
:
Status Code: AUTO
Previously:
G622
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 147
IA Controls:
DCSW-1
PDI Description:
The cron.allow file is not owned and group owned by root , sys or bin.
Reference:
UNIX STIG: 3.17.3
16. GEN003260 – cron.deny Ownership
Solaris
# ls –lL /etc/cron.d/cron.deny
HP-UX
# ls –lL /var/adm/cron/cron.deny
AIX
# ls –lL /var/adm/cron/cron.deny
IRIX
# ls –lL /etc/cron.d/cron.deny
Linux
Red Hat
# ls –lL /etc/cron.deny
Or
SuSE
# ls –lL /var/spool/cron/deny
If the cron.deny file is not owned and group owned by root, sys, or bin, then this is a finding.
PDI:
GEN003260
V0004430
Category II
:
Status Code: AUTO
Previously:
G623
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 148
IA Controls:
DCSW-1
PDI Description:
The cron.deny file is not owned and group owned by root , sys, or bin.
Reference:
UNIX STIG: 3.17.3
27. At Restrictions
1. GEN003280 – At Utility Accessibility
Verify the at.allow and/or at.deny files exist.
Solaris
# ls –lL /etc/cron.d/at.allow
# ls –lL /etc/cron.d/at.deny
HP-UX
# ls –lL /var/adm/cron/at.allow
# ls –lL /var/adm/cron/at.deny
AIX
# ls –lL /var/adm/cron/at.allow
# ls –lL /var/adm/cron/at.deny
IRIX
# ls –lL /etc/cron.d/at.allow
# ls –lL /etc/cron.d/at.deny
Linux
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 149
# ls –lL /etc/at.allow
# ls –lL /etc/at.deny
Ensure at least on of the above files exists .
PDI:
GEN003280V000098 Category:II
4
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G211
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECPA-1
PDI Description:
Access to the at utility is not controlled via the at .allow and/or
at.deny file(s).
Reference:
UNIX STIG: 3.18.3
2. GEN003300 – The at.deny File
Solaris
# more /etc/cron.d/at.deny
HP-UX
# more /var/adm/cron/at.deny
AIX
# more /var/adm/cron/at.deny
IRIX
# more /etc/cron.d/at.deny
Linux
# more /etc/at.deny
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 150
If the at.deny file exists and is empty, then this is a finding.
PDI:
GEN003300V000098 Category:II
5
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G212
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECPA-1
PDI Description:
The at.deny file exists and is empty.
Reference:
UNIX STIG: 3.18.3
3. GEN003320 – Default System Accounts and At
Solaris
# more /etc/cron.d/at.allow
HP-UX
# more /var/adm/cron/at.allow
AIX
# more /var/adm/cron/at.allow
IRIX
# more /etc/cron.d/at.allow
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 151
Linux
# more /etc/at.allow
Default accounts (such as bin, sys, adm, and others) will not be listed in the at.allow file or this will be a
finding.
PDI:
GEN003320V000098 Category:II
6
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G213
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECPA-1
PDI Description:
Default system accounts (with the exception of root) are listed in
the at.allow file or excluded from the at.deny file if at.allow does
not exist.
Reference:
UNIX STIG: 3.18.3
4. GEN003340 – at.allow and at.deny Permissions
Solaris
# ls –lL /etc/cron.d/at.allow
# ls –lL /etc/cron.d/at.deny
HP-UX
# ls –lL /var/adm/cron/at.allow
# ls –lL /var/adm/cron/at.deny
AIX
# ls –lL /var/adm/cron/at.allow
# ls –lL /var/adm/cron/at.deny
IRIX
# ls –lL /etc/cron.d/at.allow
# ls –lL /etc/cron.d/at.deny
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 152
Linux
# ls –lL /etc/at.allow
# ls –lL /etc/at.deny
If the at.allow or at.deny file(s) is more permissive than 600, then this is a finding.
PDI:
GEN003340V000098 Category:II
7
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G214
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The at.allow or at.deny file(s) is more permissive than 600.
Reference:
UNIX STIG: 3.18.3
5. GEN003360 – At Executes World Writable Programs
If at jobs exist under either /var/spool/cron/atjobs or /var/spool/atjobs , use the following
command to search for programs executed by at:
#
more <at job file>
Perform a long listing of each program file in the at job file to determine if the file is world writeable.
#
ls –la <at program file>
If at executes programs that are world writeable, then this is a finding.
PDI:
GEN003360V000098 Category:II
8
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G215
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSL-1
PDI Description:
At executes group or world writable programs.
Reference:
UNIX STIG: 3.18.3
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 153
6. GEN003380 – At Executes Programs in World Writable Directories
If at jobs exist under either /var/spool/cron/atjobs or /var/spool/atjobs , use the following
command to search for programs executed by at:
#
more <at job file>
Perform a long listing of each program file ’s parent directory found in the at job file to determine if the directory
is world writeable.
#
ls –la <at program file directory>
If at executes programs in world writeable directories, then this is a finding.
PDI:
GEN003380V000098 Category:II
9
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G216
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSL-1
PDI Description:
At executes programs in or subordinate to world writable
directories.
Reference:
UNIX STIG: 3.18.3
7. GEN003400 – The at Directory Permissions
Check the permissions of the at directory by performing the following:
# ls –ld /var/spool/cron/atjobs
Or
#
ls –ld /var/spool/atjobs
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 154
If the directory permissions are greater than 755, then this is a finding.
PDI:
GEN003400V000436 Category:II
4
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G625
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The at (or equivalent) directory is more permissive than 755.
Reference:
UNIX STIG: 3.18.3
8. GEN003420 – The at Directory Ownership
Check the ownership of the at directory by performing the following:
# ls –ld /var/spool/cron/atjobs
Or
#
ls –ld /var/spool/atjobs
If the directory is not owned by root, sys, bin, or daemon, then this is a finding.
PDI:
GEN003420V000436 Category:II
5
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G626
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The at directory is not owned by root, sys, bin, or daemon.
Reference:
UNIX STIG: 3.18.3
9. GEN003440 – At Programs umask
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 155
Perform the following to check for at jobs:
#
cd /var/spool/cron/atjobs
Or
#
cd /var/spool/atjobs
Determine if there are any at jobs by viewing a long listing of the directory. If there are at jobs perform the
following to check for any programs that may have a umask more permissive than 077:
#
grep umask ./*
If there are any, this is a finding unless the IAO has justifying documentation. If there are no ‘at’ jobs present,
this vulnerability is Not Applicable.
PDI:
GEN003440V000436 Category II
6
:
MAC/Confidentiality Levels:
Status Code:PART
Previously:
G627
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1, DCSD-1
PDI Description:
At programs set the umask more permissive than 077 and these
are not justified and documented with the IAO.
Reference:
UNIX STIG: 3.18.3
10. GEN003460 – at.allow Ownership
Solaris
# ls –lL /etc/cron.d/at.allow
HP-UX
# ls –lL /var/adm/cron/at.allow
AIX
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 156
# ls –lL /var/adm/cron/at.allow
IRIX
# ls –lL /etc/cron.d/at.allow
Linux
# ls –lL /etc/at.allow
If the at.allow file is not owned and group owned by root, sys, or bin, then this is a finding.
PDI:
GEN003460V000436 Category II
7
:
MAC/Confidentiality Levels:
Status Code:PART
Previously:
G629
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The at.allow file is not owned and group owned by root , sys, or
bin.
Reference:
UNIX STIG: 3.18.3
11. GEN003480 – at.deny Ownership
Solaris
# ls –lL /etc/cron.d/at.deny
HP-UX
# ls –lL /var/adm/cron/at.deny
AIX
# ls –lL /var/adm/cron/at.deny
IRIX
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 157
# ls –lL /etc/cron.d/at.deny
Linux
# ls –lL /etc/at.deny
If the at.deny file is not owned and group owned by root, sys, or bin, then this is a finding.
PDI:
GEN003480V000436 Category II
8
:
MAC/Confidentiality Levels:
Status Code:PART
Previously:
G630
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The at.deny file is not owned and group owned by root , sys, or
bin.
Reference:
UNIX STIG: 3.18.3
28. Restrict/Disable Core Dumps
1. GEN003500 – Restrict or Disable Core Dumps
Check for the disabling of core dumps with the following commands:
Solaris
# coreadm |grep enabled
If any lines are returned then this is a finding.
HP-UX
# grep ulimit /etc/profile
If the –c argument with a value of ‘0’ is not present, then this is a finding.
AIX
#
grep ulimit /etc/security/limits
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 158
If the –c argument with a value of ‘0’ is not present, then this is a finding.
Linux
#
ulimit –c
If the above command does not return 0 ,then this a finding.
IRIX
#
systune rlimit_core_max
0
If the above command does not return 0, then this is a finding.
PDI:
GEN003500V001199 Category III
6
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
Core dumps are not disable d or restricted.
Reference:
UNIX STIG: 3.20.1
2. GEN003520 – Core Dump Directory Ownership and Permissions
Perform the following to check the permissions of the core dump directory:
Solaris
# ls –ld /var/crash
HP-UX
#
ls –ld /var/adm/crash
#
ls –ld /var/adm/ras
AIX
IRIX
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 159
#
ls –ld /var/adm/crash
#
ls –ld /var/crash
Linux
If the file permissions are greater than 700, then this is a finding. If GEN003500 is Not a Finding, then this
check is Not Applicable.
PDI:
GEN003520V001199 Category III
7
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
PDI Description:
The core dump data directory is not owned and group owned by
root and/or is more permissive than 700.
Reference:
UNIX STIG: 3.20.1
29. Disable Executable Stack
1. GEN003540 – Disable Executable Stack
To check that the executable stack has been disabled, perform the following:
Solaris and Irix
#
grep noexec_user_stack /etc/system
If the noexec_user_stack is not set to ‘1’, then this is a finding.
HP-UX
Executable stacks are disabled by default. Check to ensure this is still set by:
#
kmtune –q executable_stack
If the executable_stack tuneable is set to 1, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 160
Linux
Linux kernels must support the NX feature. Red Hat Enterprise 4 and SuSE 9.1 and later do support this
feature. This will be a finding on systems prior to the above releases. This is a manual review.
AIX
Stack execution is disabled by default. Mark this check Not a Finding.
PDI:
GEN003540V001199 Category:II
9
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
PDI Description:
The executable stack is not disabled.
Reference:
UNIX STIG: 3.20.2
30. Restrict NFS Port Listening
31. Use More Random TCP Sequence Numbers
1. GEN003580 – TCP Sequence Numbers
Check the following to determine if TCP sequence numbers are not easily guessed:
Solaris
#
grep “TCP_STRONG_ISS=2” /etc/default/inetinit
If the this variable is not set, then this is a finding.
HP-UX
#
ndd /dev/tcp tcp_isn_passphrase
If the tcp_isn_passphrase tuneable is not set, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 161
Linux
All kernels after 1996 are not vulnerable to this. This check should be marked as Not Applicable for Linux.
AIX
#
instfix –ivk iy55950
#
instfix –ivk iy55949
#
instfix –ivk iy62006
If the above patches are not applied, then this is a finding.
Irix
#
systune tcpiss_md5
1
If any of the above settings are not configured, then this is a finding.
PDI:
GEN003580V001200 Category:II
1
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
More random TCP sequence numbers are not used.
Reference:
UNIX STIG: 3.20.4
32. Network Security Settings
1. GEN003600 – Network Security Settings
Perform the following to ensure the network security settings are enabled for each operating system. The
command is listed with the expected response below it.
Solaris
#
ndd /dev/ip ip_forward_src_routed
0
#
ndd /dev/tcp tcp_rev_src_routes
0
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 162
#
ndd /dev/tcp tcp_conn_req_max_q0
2048 or greater
#
ndd /dev/tcp tcp_conn_req_max_q
1024
#
ndd /dev/ip ip_respond_to_timestamp
0
#
ndd /dev/ip ip_respond_to_echo_broadcast
0
#
ndd /dev/ip ip_respond_to_timestamp_broadcast
0
HP-UX
#
ndd /dev/ip ip_forward_src_routed
0
#
ndd /dev/ip ip_respond_to_timestamp
0
#
ndd /dev/ip ip_respond_to_echo_broadcast
0
#
ndd /dev/ip ip_respond_to_timestamp_broadcast
0
AIX
#
/usr/sbin/no –o ipsrcroutesend
0
#
/usr/sbin/no –o directed_broadcast
0
#
/usr/sbin/no –o bcastping
0
#
/usr/sbin/no –o ipsrcrouteforward
0
Linux
# sysctl –a | grep net.ipv4.ip_forward
0
#
sysctl –a | grep net.ipv4.tcp_max_syn_backlog
1280
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 163
#
sysctl –a | grep net.ipv4.conf.all.accept_source_route
0
#
sysctl –a | grep net.ipv4.icmp_echo_ignore_broadcasts
1
Irix
#
systune ipforward
2
#
systune allow_brdaddr_scraddr
0
If any of the above settings are not applied ,then this is a finding.
PDI:
GEN003600V001200 Category:II
2
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
Network parameters are not securely set.
Reference:
UNIX STIG: 3.20.5
33. File Systems
1. GEN003620 – Separate Filesytem Partitions
Perform the following to determine if the /var, /home, and /export/home file partitions are on separate disk
partitions:
#
more /etc/fstab
Or
# more /etc/vfstab
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 164
Examine the first column for the disk device and ensure the device label for /var, /home, or /export/home are not
the same as the root filesystem. If they are the same, ask the SA if this is justified and documented with the
IAO. If it is not, then this is a finding.
PDI:
GEN003620V001200 Category III
3
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
Separate filesystem partitions are not used for /home, /export/
home, and /var and is not justified and documented with the IAO.
Reference:
UNIX STIG: 3.21
2. GEN003640 – Root Filesystem Logging
Logging should be enabled for those types of files systems that do not turn on logging by default. JFS, VXFS,
HFS and EXT3 all turn logging on by default and will not be a finding. For those that do not turn logging on by
default, perform the following:
#
mount | grep logging
Ensure the root file systems shows ‘loggin g’ or this will be a finding.
PDI:
GEN003640V000430 Category:II
4
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G690
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
Logging is not implemented for the root filesystem.
Reference:
UNIX STIG: 3.21
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 165
34. Syslog AUTH/AUTHPRIV Facility
1. GEN003660 – Authentication Data Logging
Check /etc/syslog.conf and verify the auth facility is logging both the notice and info level messages by:
#
grep “auth.notice” /etc/syslog.conf
#
“auth.info” /etc/syslog.conf
grep
If either of the above two entries are not found, then this is a finding.
PDI:
GEN003660V001200 Category:II
4
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1,DCCS-2
PDI Description:
Authentication and informational data is not logged.
Reference:
UNIX STIG: 3.21
3. Network Services
1. Network Services
1. GEN003680 – Required Network Services For Operation
Perform the following to display network services that are configured:
#
grep –v “^#” /etc/inetd.conf
Or
#
svcs –a (solaris 10)
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 166
Or for Linux systems
# grep disable /etc/xinetd.d/* |grep no
Ask the SA if the network services are documented with the IAO.
PDI:
GEN003680V000097 Category III Status Code:PART
2
:
MAC/Confidentiality Levels:
Previously:
A028
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSD-1, DCPP-1
PDI Description:
Network services not required for operations are not disabled
and/or network services required for operations are not
documented with the IAO.
Reference:
UNIX STIG: 4
2. GEN003700 – Disable inetd/xinetd
First determine if inetd/xinetd is running:
#
ps –ef |grep inetd
#
ps –ef |grep xinetd
Or
Or
# svcs -a
If inetd is not running, then this check is not a finding. Otherwise continue:
#
grep –v “^#” /etc/inetd.conf
#
grep –v “^#” /etc/xinetd.conf
Or
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 167
Or for Linux systems
# grep disable /etc/xinetd.d/* |grep no
If any services are found from the above three commands, then this is considered not a finding.
PDI:
GEN003700V001200 Category:II
5
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
PDI Description:
All inetd/xinetd services are disabled and inetd (xinetd for Linux)
is not disabled.
Reference:
UNIX STIG: 4
3. GEN003720 – inetd.conf Ownership
Check the permissions of inetd.conf file by:
#
ls –lL /etc/inetd.conf
Or, for Linux systems
#
ls –lL /etc/xinetd.conf
#
ls –lL /etc/xinetd.d
This is a finding if any of the above files or directories are not owned by root or bin.
PDI:
GEN003720V000082 Category:II
1
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G107
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The inetd.conf file (xinetd.conf file and the xinetd.d directory for
Linux) is not owned by root or bin.
Reference:
UNIX STIG: 4
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 168
4. GEN003740 – inetd.conf Permissions
Check the permissions of inetd.conf file by:
#
ls –lL /etc/inetd.conf
Or, for Linux systems
#
ls –lL /etc/xinetd.conf
#
ls –lL /etc/xinetd.d
This is a finding if permissions for the inetd.conf files are greater than 440. In addition, on Linux systems,
the /etc/xinetd.d directory permissions should not be greater than 755.
PDI:
GEN003740V000082 Category:II
2
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G108
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
The inetd.conf (xinetd.conf for Linux) file is more permissive
than 440. The Linux xinetd.d. directory is more permissive than
755.
Reference:
UNIX STIG: 4
5. GEN003760 – The Services File Ownership
# ls –lL /etc/services
The services file is not owned by root or bin, then this is a finding
PDI:
GEN003760V000082 Category II
3
:
MAC/Confidentiality Levels:
Status Code:PART
Previously:
G109
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 169
IA Controls:
ECLP-1
PDI Description:
The services file is not owned by root or bin.
Reference:
UNIX STIG: 4
6. GEN003780 – The Services File Permissions
# ls –lL /etc/services
If the services file is more permissive than 644, then this is a finding.
PDI:
GEN003780V000082 Category II
4
:
MAC/Confidentiality Levels:
Status Code:PART
Previously:
G110
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2, ECLP-1
PDI Description:
The services file is more permissive than 644.
Reference:
UNIX STIG: 4
7. GEN003800 – inetd Logging
Solaris 2.5 through 9
#
ps –ef |grep inetd |grep “-t”
Solaris 10
#
inetadm –p |grep tcp_trace
If the tcp_trace option is not found in the exported configuration file, then this is a finding.
HP-UX
#
ps –ef |grep inetd |grep “-l”
AIX and IRIX
#
ps –ef |grep inetd |grep “-d”
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 170
Linux
Each file in the /etc/xinetd.d directory and the /etc/inetd.conf file should be examined for
the following:
log_type
= SYSLOG authpriv
log_on_success
= HOST PID USERID EXIT
log_on_failure
= HOST USERID
If inetd logging is not enabled, then this is a finding.
PDI:
GEN003800V000101 Category III
1
:
MAC/Confidentiality Levels:
Status Code:PART
Previously:
G198
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2, ECLP-1
PDI Description:
Inetd (xinetd for Linux) logging/tracing is not enabled.
Reference:
UNIX STIG: 4
2. Rlogin and rsh
1. GEN003820 – Remote Login or Shell Is Enabled
Solaris, HP-UX, AIX, IRIX
# grep –v “^#” /etc/inetd.conf |grep rlogind
# grep –v “^#” /etc/inetd.conf |grep rshd
Solaris 10
#
svcs rlogin
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 171
Linux
#
grep disable /etc/xinetd.d/rlogin
#
grep disable /etc/xinetd.d/rsh
If either rlogin or rsh are found to be enabled, then this is a finding.
PDI:
GEN003820V000468 Category I
7
:
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
V042
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
Remote login or remote shell is enabled.
Reference:
UNIX STIG: 4.1
3. Rexec
1. GEN003840 – The rexec Service Is Enabled
Perform the following to determine if the rexec service is enabled:
Solaris, HP-UX, AIX, IRIX
# grep –v “^#” /etc/inetd.conf |grep rexec
Solaris 10
#
svcs rexec |grep disabled
Linux
#
grep disable /etc/xinetd.d/rexec
If rexec is found to be enabled, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 172
GEN003840V000468 Category I
8
:
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
V102
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The rexec service is enabled.
Reference:
UNIX STIG: 4.2
4. Finger
1. GEN003860 – The finger Service Is Enabled
Perform the following to determine if the finger service is enabled:
Solaris, HP-UX, AIX, IRIX
# grep –v “^#” /etc/inetd.conf |grep finger
Solaris 10
#
svcs finger
Linux
#
grep disable /etc/xinetd.d/finger
If the finger service is not disabled, then this is a finding.
PDI:
GEN003860V000470 Category:III
1
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
V046
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 173
IA Controls:
DCSW-1
PDI Description:
The finger Service Is Enabled
Reference:
UNIX STIG: 4.3
2. GEN003865 – Network analysis tools enabled.
Perform the following to determine if any network analysis tools are enabled:
# find / -name ethereal
# find / -name tcpdump
# find / -name snoop
If the any of the above network analysis tools are found, then this is a finding.
PDI:
GEN003865V001204 Category:II
9
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
Network Analysis tools are enabled.
Reference:
UNIX STIG: 4.3
5. Remote Host Printing
1. GEN003880 – Print Server and Client Configuration Documentation
Ask the SA if the system is a print server or a client of another server. If it is either of these, ask the SA if it is
documented with the IAO. If the printer configuration is not documented with the IAO, then this is a finding.
PDI:
GEN003880V000082 Category II
6
:
MAC/Confidentiality Levels:
IA Controls:
Status Code:MAN
Previously:
G120
MAC I – CSP, MAC II – CSP, MAC III – CSP
PESL-1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 174
PDI Description:
The system is a print server /client, and the configuration is not
documented with the IAO.
Reference:
UNIX STIG: 4.4
2. GEN003900 – hosts.lpd Contents
Look for the presence of a print service configuration file by using the command:
#
find /etc –name hosts.lpd –print
If this file does not exist, use the command:
#
find /etc –name Systems -print
If this file does not exist, use the command:
#
find /etc –name printers.conf
If neither of the files are found, then this check should be marked Not Applicable.
Otherwise perform:
#
more <print service file>
and search for entries that contain a ‘+’ or ‘_’ character. If any are found then this is a finding.
PDI:
GEN003900V000082 Category:II
7
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G121
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSL-1
PDI Description:
The hosts.lpd file (or equivalent) contains a ‘+’ or ‘_’ character.
Reference:
UNIX STIG: 4.4
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 175
3. GEN003920 – hosts.lpd Ownership
Look for the presence of a print service configuration file by using the command:
#
find /etc –name hosts.lpd –print
If this file does not exist, use the command:
#
find /etc –name Systems -print
If this file does not exist, use the command:
#
find /etc –name printers.conf
If neither of the files are found, then this check should be marked Not Applicable. Otherwise perform:
#
ls –lL <print service file>
If the owner of the file is not root, sys, bin or lp, then this is a finding.
PDI:
GEN003920V00008 Category II
28
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G122
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The hosts.lpd (or equivalent) file is not owned by a root, sys, bin,
or lp.
Reference:
UNIX STIG: 4.4
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 176
4. GEN003940 – hosts.lpd Permissions
Look for the presence of a print service configuration file by using the command:
#
find /etc –name hosts.lpd –print
If this file does not exist, use the command:
#
find /etc –name Systems -print
If this file does not exist, use the command:
#
find /etc –name printers.conf
If neither of the files are found, then this check should be marked Not Applicable. Otherwise perform:
#
ls –lL <print service file>
and verify the permissions are not greater than 664. If the permissions are greater than 664, then this is a
finding.
PDI:
GEN003940V000082 Category:II
9
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G123
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The hosts.lpd (or equivalent) file is more permissive than 664.
Reference:
UNIX STIG: 4.4
6. Traceroute
1. GEN003960 – The traceroute Command Ownership
Solaris
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 177
# ls –lL /usr/sbin/traceroute
HP-UX
# ls –lL /usr/sbin/traceroute
AIX
# ls –lL /usr/bin/traceroute
IRIX
# ls –lL /usr/etc/traceroute
Linux
# ls –lL /usr/sbin/traceroute
If the traceroute command is not owned by root, then this is a finding.
PDI:
GEN003960V000436 Category:II
9
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G631
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The traceroute command is not owned by root.
Reference:
UNIX STIG: 4.5
2. GEN003980 – The traceroute Command Group Ownership
Solaris
# ls –lL /usr/sbin/traceroute
HP-UX
# ls –lL /usr/sbin/traceroute
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 178
AIX
# ls –lL /usr/bin/traceroute
IRIX
# ls –lL /usr/etc/traceroute
Linux
# ls –lL /usr/sbin/traceroute
If the traceroute command is not group owned by root, sys, or bin, then this is a finding.
PDI:
GEN003980V000437 Category:II
0
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G632
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The traceroute command is not group owned by root, sys, or bin.
Reference:
UNIX STIG: 4.5
3. GEN004000 – The traceroute Command Permissions
Solaris
# ls –lL /usr/sbin/traceroute
HP-UX
# ls –lL /usr/sbin/traceroute
AIX
# ls –lL /usr/bin/traceroute
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 179
IRIX
# ls –lL /usr/etc/traceroute
Linux
# ls –lL /usr/sbin/traceroute
If the traceroute command is more permissive than 700, then this is a finding.
PDI:
GEN004000V000437 Category:II
1
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G633
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The traceroute command is more permissive than 700.
Reference:
UNIX STIG: 4.5
7. Client Browser Requirements
1. GEN004020 – Browser Capable of 128-bit Encryption
This check will only apply to Netscape web browsers. All versions of Mozilla and Mozilla Firefox support 128bit encryption. Select Help from the browser menu, and then select About Navigator. The Netscape information
page will display. The line which says “This version supports U.S. security” indicates you have 128 bit
encryption. If its says “This version supports International security” you have 40 bit encryption and this is a
finding.
PDI:
GEN004020V000437 Category III
2
:
MAC/Confidentiality Levels:
IA Controls:
Status Code:MAN
Previously:
G634
MAC I – CSP, MAC II – CSP, MAC III – CSP
DCSW-1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 180
PDI Description:
The browser is not capable of 128-bit encryption.
Reference:
UNIX STIG: 4.6
2. GEN004040 – Browser Software Update Feature
This check will only apply to Netscape web browsers. All versions of Mozilla and Mozilla Firefox can check for
new browser version, but will not automatically install them. Verify that automatic software installation is not
enabled. Select Edit>>Preferences>>Advanced from the web browser toolbar. Drop down the Advanced submenu. The Advanced options sub-menu gives us the Software Installation settings. Verify the ‘Enable software
installation’ setting is not checked. If it is checked, then this is a finding.
PDI:
GEN004040V000437 Category II
3
:
MAC/Confidentiality Levels:
Status Code:MAN
Previously:
G635
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The browser SmartUpdate or software update feature is enabled.
Reference:
UNIX STIG: 4.6
3. GEN004060 – Browser Unencrypted Secure Content Caching
This check is mainly pertaining to passwords or sensitive data that can be stored by the browser cache. Ensure
the following setting is enabled: Edit>>Preferences>>Privacy&Security from the web browser toolbar. Select
the Passwords sub-category and verify ‘Use encryption when storing sensitive data’ under the Encrypting versus
Obscuring is checked. If it is not, then this is a finding.
PDI:
GEN004060V000437 Category II
4
:
MAC/Confidentiality Levels:
Status Code:MAN
Previously:
G636
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The browser has unencrypted secure content caching enabled.
Reference:
UNIX STIG: 4.6
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 181
4. GEN004100 – Browser Allows Active Scripting
To check if Java is enabled in the Netscape or Mozilla browser select Edit >> Preferences from the browser tool
bar, and then select the Advanced menu i tem. If the option, “Enable Java” is checked, this is a finding.
To determine if a browser has JavaScript Enabled perform:
Select Edit>>Preferences>Advanced from the browser toolbar. Select the Scripts and Plug-ins tab. Ensure that
“Navigator” is not selected under the Enable JavaScript heading. If it is, then this is a finding.
If either Java or JavaScript are enabled, then this is a finding.
PDI:
GEN004100V000437 Category III
6
:
MAC/Confidentiality Levels:
Status Code:MAN
Previously:
G638
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The browser allows active scripting.
Reference:
UNIX STIG: 4.6
5. GEN004120 – Browser Data Redirection Warning
To determine if a browser has browser data redirection warning enabled perform:
Select Edit>>Preferences>Privacy and Security from the browser toolbar. Select the Validation tab. Ensure that
“Use OCSP to validate only certificates that specify an OCSP service URL” is selected under the OCSP heading.
If it is not selected, then this is a finding.
PDI:
GEN004120V000437 Category II
7
:
MAC/Confidentiality Levels:
IA Controls:
Status Code:MAN
Previously:
G639
MAC I – CSP, MAC II – CSP, MAC III – CSP
DCSW-1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 182
PDI Description:
The browser does not issue a warning when form data is
redirected.
Reference:
UNIX STIG: 4.6
6. GEN004160 – Browser Certificate Warning
To check if a browser warning is enabled to issue a warning prior to viewing remote data select Edit >>
Preferences in the browser tool bar, and then select the Privacy and Security (Advanced in Mozilla) menu i tem.
Select the Validation tab and verify that “Use OCSP to validate only certificates that specify an OCSP service
URL” under OCSP. If it is not selected, then this is a finding.
PDI:
GEN004160V000437 Category III
9
:
MAC/Confidentiality Levels:
Status Code:MAN
Previously:
G641
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The browser does not issue a warning prior to viewing remote
data on a remote site containing a security certificate that does
not match its Internet address.
Reference:
UNIX STIG: 4.6
7. GEN004180 – Browser Home Page
Click on “Edit”>>“Preferences”>> “Navigator”, and verify the “Blank Page” button under “Navigator Start
With” is selected or, if Home Page is selected, verify the pathname under the Home Page box is for a local web
server. For Firefox select Edit >> Preferences in the browser tool bar, and then select the General item.
PDI:
GEN004180V000438 Category II
0
:
MAC/Confidentiality Levels:
IA Controls:
Status Code:MAN
Previously:
G642
MAC I – CSP, MAC II – CSP, MAC III – CSP
DCSW-1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 183
PDI Description:
The browser home page is not a blank page or a locally generated
page.
Reference:
UNIX STIG: 4.6
8. GEN004200 – Browser SSL Configuration
To check if browsers are configured for SSL, select Edit >> Preferences in the browser tool bar, and then select
the Privacy and Security menu i tem. Select the SSL tab and verify that “Enable SSL version 2” and “Enable
SSL version 3” is checked under the SSL Protocol versions. If they are not, then this is a finding. The tables
below show the encryption algorithms associated with each version of SSL.
PDI:
GEN004200V000438 Category II
1
:
MAC/Confidentiality Levels:
Status Code:MAN
Previously:
G643
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The browser is not configured for Secure Socket Layer (SSL) v2
and SSL v3.
Reference:
UNIX STIG: 4.6
SSL v2 Enable
X
RC4 encryption with 128-bit key
X
RC2 encryption with 128-bit key
X
Triple DES encryption with 168-bit key
DES encryption with 56-bit key
X
RC4 encryption with 128-bit key
RC2 encryption with 40-bit key
Table 4-1. SSL v2 Enable
SSL v3 Enable
X
RC4 encryption with 128-bit key and an MD5 MAC
X
Triple DES encryption with 168-bit key and a SHA-1 MAC
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 184
DES encryption with 56-bit key and a SHA-1 MAC
RC4 encryption with 40-bit key and an MD5 MAC
RC2 encryption with a 40-bit key and an MD5 MAC
No encryption with an MD5 MAC
Table 4-2. SSL v3 Enable
9. GEN004220 – The root Account’s Browser
Look in the root account home directory for a .netscape or a .mozilla directory. If none exists, mark
this check as Not A Finding. If there is one, verify with the root users and the IAO what the intent of the
browsing is. Some evidence may be obtained by using the browser to view cached pages under the .netscape
directory.
PDI:
GEN004220V000438 Category I
2
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G644
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECMT-1, ECMT-2
PDI Description:
The root account uses the browser for reasons other than to
control local applications.
Reference:
UNIX STIG: 4.6
10. GEN004240 – Browser Version
To view the version number click “ Help” then click “About Browser ” from the browser tool bar. If the browser
version is not Netscape 4.79 or greater, or FireFox 1.5 or greater, then this is a finding.
PDI:
GEN004240V000103 Category II
8
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
W01
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 185
IA Controls:
DCSQ-1
PDI Description:
The browser is not a supported version.
Reference:
UNIX STIG: 4.6
11. GEN004260 – Browser Cookie Warning
To check if a browser is enabled to display a warning prior to accepting cookies, select Edit >> Preferences in the
browser tool bar, and then select the Privacy and Security menu i tem. Select the Cookies tab and verify that
“Ask for each cookie” is checked under the Cookie Lifetime Policy. If it is not, then this is a finding.
PDI:
GEN004260V000103 Category:III
9
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
W03
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECWM-1
PDI Description:
The browser does not issue a warning prior to accepting a cookie
from a remote site.
Reference:
UNIX STIG: 4.6
12. GEN004280 – Browser Form Data Warning
To check if a browser is enabled to issue a warning when submitting unencrypted form data, select Edit >>
Preferences in the browser tool bar, and then select the Privacy and Security menu i tem. Select the SSL tab and
verify that “Sending form data from an unencrypted page to an unencrypted page” is checked. If it is not, then
this is a finding.
Note: This is a core setting in Firefox and should be marked as Not A Finding.
PDI:
GEN004280V000104 Category:III
1
MAC/Confidentiality Levels:
IA Controls:
Status Code:AUTO
Previously:
W09
MAC I – CSP, MAC II – CSP, MAC III – CSP
ECWM-1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 186
PDI Description:
A browser does not issue a warning when submitting non
encrypted form data.
Reference:
UNIX STIG: 4.6
13. GEN004300 – Browser Secure and Non-secure Content Warning
To check if a browser warning is enabled when viewing a page with both encrypted/unencrypted content, select
Edit >> Preferences in the browser tool bar, and then select the Privacy and Security menu i tem. Select the SSL
tab and verify that “Viewing a page with an encrypted/unencrypted mix” is checked. If it is not, then this is a
finding.
Note: This is a core setting in Firefox and should be marked as Not A Finding.
PDI:
GEN004300V000104 Category:III
2
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
W11
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECWM-1
PDI Description:
The browser does not issue a warning prior to viewing a
document with both secure and non-secure content.
Reference:
UNIX STIG: 4.6
14. GEN004320 – Browser Leaving Encrypted Site Warning
To check if a browser warning is enabled when leaving an encrypted site, select Edit >> Preferences in the
browser tool bar, and then select the Privacy and Security menu i tem. Select the SSL tab and verify that
“Leaving a page that supports encryption” is checked. If it is not, then this is a finding.
Note: This is a core setting in Firefox and should be marked as Not A Finding.
PDI:
GEN004320V000104 Category:III
3
MAC/Confidentiality Levels:
IA Controls:
Status Code:AUTO
Previously:
W13
MAC I – CSP, MAC II – CSP, MAC III – CSP
ECWM-1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 187
PDI Description:
The browser does not issue a warning prior to leaving an
encrypted or secure site.
Reference:
UNIX STIG: 4.6
8. Sendmail or Equivalent
1. GEN004360 – aliases Ownership
Find the aliases file on the system:
# find / -name aliases –depth –print
#
ls –lL <alias location>
If the file is not owned by root, then this is a finding.
PDI:
GEN004360V000083 Category:II
1
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G127
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The aliases file is not owned by root.
Reference:
UNIX STIG: 4.7
2. GEN004380 – aliases Permissions
Find the aliases file on the system:
# find / -name aliases –depth –print
#
ls –lL <alias location>
If the permissions are greater than 644, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 188
GEN004380V000083 Category:II
2
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G128
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The aliases file is more permissive than 644.
Reference:
UNIX STIG: 4.7
3. GEN004400 – File Executed Through Aliases Accessibility
Find the aliases file on the system:
# find / -name aliases –depth –print
# more <aliases file location>
Examine the aliases file for any directories or paths that may be utilized. Perform:
# ls –lL <path>
Ensure the file and parent directory are owned by root. If it is not, then this a finding.
PDI:
GEN004400V000083 Category I
3
:
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G131
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
Files executed through an aliases file are not owned by root and
do not reside within a directory owned and writable only by root.
Reference:
UNIX STIG: 4.7
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 189
4. GEN004420 – File Executed Through Aliases Permissions
Find the aliases file on the system:
# find / -name aliases –depth –print
# more <aliases file location>
Examine the aliases file for any directories or paths that may be utilized. Perform:
# ls –lL <path>
to check the permissions are not greater than 755.
If files executed through an alias have permissions greater than 755, then this is a finding.
PDI:
GEN004420V000083 Category:II
4
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G132
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
Files executed through an aliases file are more permissive than
755.
Reference:
UNIX STIG: 4.7
5. GEN004440 – Sendmail Logging
Find the sendmail.cf file on the system:
# find / -name sendmail.cf
To check if sendmail logging is set to level nine:
#
grep “O L” <sendmail location>/sendmail.cf
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 190
Or
#
grep LogLevel <sendmail location>/sendmail.cf
If logging is set to less than nine, then this is a finding.
PDI:
GEN004440V000083 Category IV Status Code:AUTO
5
:
MAC/Confidentiality Levels:
Previously:
G133
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECAR-1, ECAR-2, ECAR-3
PDI Description:
Sendmail logging is set to less than nine in sendmail.cf.
Reference:
UNIX STIG: 4.7
6. GEN004460 – Critical Level Sendmail Messages Logging
Enter the command:
#
more /etc/syslog.conf
Ensure the configuration file logs mail.crit , mail.debug, mail.*, or *.crit . If the system is
not logging critical sendmail messages, then this is a finding.
PDI:
GEN004460V000083 Category:II
6
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G134
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECAR-1, ECAR-2, ECAR-3
PDI Description:
Critical-level sendmail messages are not logged.
Reference:
UNIX STIG: 4.7
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 191
7. GEN004480 – Critical Sendmail Log File Ownership
Perform:
#
more /etc/syslog.conf
Ensure the configuration file logs mail.crit, mail.debug, mail.*, or *.crit to a file.
Perform:
#
ls -lL <file location>
If the files is not owned by root, then this is a finding.
PDI:
GEN004480V000083 Category:II
7
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G135
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECTP-1
PDI Description:
Critical sendmail log file is not owned by root.
Reference:
UNIX STIG: 4.7
8. GEN004500 – Critical Sendmail Log File Permissions
Perform:
#
more /etc/syslog.conf
Ensure the configuration file logs mail.crit, mail.debug, mail.*, or *.crit to a file.
Perform:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
#
Page 192
ls -lL <file location>
If the log file permissions are greater than 644, then this is a finding.
PDI:
GEN004500V000083 Category:II
8
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G136
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
Critical sendmail log file is more permissive than 644.
Reference:
UNIX STIG: 4.7
9. GEN004540 – Sendmail Help Command
To check if Help is disabled in sendmail, perform the following:
#
telnet <host>:25
# help
The help feature can be disabled by creating an empty help file.
If the help command returns any sendmail version information, then this is a finding.
PDI:
GEN004540V001200 Category:II
6
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
The sendmail help command is not disabled.
Reference:
UNIX STIG: 4.7
10. GEN004560 – Sendmail Greeting to Mask Version
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 193
To check for the sendmail version being displayed in the greeting:
#
telnet localhost 25
If a version number is displayed, then the following line should be added to correct the problem in the
sendmail.cf file.
O SmtpGreetingMessage= Mail Server Ready ; $b
If the above entry is not in the sendmail.cf file, then this is a finding.
PDI:
GEN004560V000438 Category:III
4
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G646
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
The O Smtp greeting in sendmail.cf, or equivalent, has not been
changed to mask the version.
Reference:
UNIX STIG: 4.7
11. GEN004580 – .forward Files
Search for any .forward files on the system by:
#
find –name .forward –print
This is considered a finding if any .forward files are found on the system.
PDI:
GEN004580V000438 Category I
5
:
MAC/Confidentiality Levels:
IA Controls:
Status Code:AUTO
Previously:
G647
MAC I – CSP, MAC II – CSP, MAC III – CSP
DCSW-1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 194
PDI Description:
. forward files were found.
Reference:
UNIX STIG: 4.7
12. GEN004600 – Sendmail Version
Perform:
#
find / -name sendmail
to locate the sendmail daemon, and then perform:
#
what <file location>
#
strings <file location> | grep version
or
or
# sendmail –d0
to determine the sendmail daemon version. Version 8.13.8 is the latest required version.
If the sendmail version is not at least 8.13. 8, then this is a finding.
PDI:
GEN004600V000468 Category I
9
:
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
V124
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
A sendmail server has an out-of-date version of sendmail active.
Reference:
UNIX STIG: 4.7
13. GEN004620 – Sendmail DEBUG Command
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 195
Perform the following to determine if debug is disabled:
#
telnet localhost 25
debug
If the command does not return a 500 error code of command unrecognized, then this is a finding.
PDI:
GEN004620V000469 Category I
0
:
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
V125
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
The sendmail debug command is not disabled.
Reference:
UNIX STIG: 4.7
14. GEN004640 – Sendmail DECODE Command
Perform the following to determine if decode is disabled:
#
telnet localhost 25
decode
If the command does not return a 500 error code of command unrecognized, then this is a finding.
PDI:
GEN004640V000469 Category I
1
:
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
V126
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
The sendmail decode command is not disabled.
Reference:
UNIX STIG: 4.7
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 196
15. GEN004660 – Sendmail EXPN Command
Perform the following to determine if expn is disabled:
#
telnet localhost 25
expn root
If the command does not return a 500 error code of command unrecognized, then this is a finding.
Or
Locate the sendmail.cf configuration file by:
#
find / -name sendmail.cf –print
#
grep –v “^#” <sendmail.cf location> |grep –i no expn
On HP-UX and AIX systems look for:
# grep –v “^#” <sendmail.cf location> |grep –i \
privacyoptions
The O PrivacyOptions should have the noexpn and novrfy options, or the goaway option to cover
both.
Ensure that the expn command is disabled with an entry in the sendmail.cf file that reads as follows:
Opnoexpn, noexpn , or goaway .
If the expn command is not disabled, then this is a finding.
PDI:
GEN004660V000469 Category:III
2
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
V128
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
The sendmail expn command is not disabled.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 197
Reference:
UNIX STIG: 4.7
16. GEN004680 – Sendmail VRFY Command
Perform the following to determine if vrfy is disabled:
#
telnet localhost 25
vrfy root
If the command does not return a 500 error code of command unrecognized, then this is a finding.
Or
Locate the sendmail.cf configuration file by:
#
find / -name sendmail.cf –print
#
grep –v “^#” <sendmail.cf location> |grep –i no vrfy
Ensure the vrfy command is disabled with an entry in the sendmail.cf file. The entry could be any one of
Opnovrfy , novrfy, goaway .
The goaway argument encompasses many things, such as novrfy
and noexpn .
PDI:
GEN004680V000469 Category:III
3
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
V130
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
The sendmail vrfy command is not disabled.
Reference:
UNIX STIG: 4.7
17. GEN004700 – Sendmail WIZ Command
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 198
Perform the following to determine if wizard is disabled:
#
telnet localhost 25
wiz
wizard
If the command does not return a 500 error code of command unrecognized, then this is a finding.
Or
Locate the sendmail.cf configuration file by:
#
find / -name sendmail.cf –print
#
grep –v “^#” <sendmail.cf location> |grep –i wiz
If an entry is found for wiz, then this is a finding.
PDI:
GEN004700V000469 Category:III
4
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
V131
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
The sendmail wiz/wizzard command is not disabled.
Reference:
UNIX STIG: 4.7
9. File Transfer Protocol (FTP) and Telnet
1. GEN004720 – FTP or Telnet Within Enclave Behind Router
Perform the following to check for FTP or Telnet within the enclave:
# last | more
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 199
If any FTP or Telnet connections are found, examine the third field and ask the SA if the initiating client is inside
of the enclave. Ask the SA if the network connection is behind the premise router and protected by a firewall or
router access control list. If it is not, then this is a finding.
PDI:
GEN004720V001200 Category:II
7
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
FTP or telnet within an enclave is not behind the premise router
and protected by a firewall and router access control lists.
Reference:
UNIX STIG: 4.8
2. GEN004760 – FTP or Telnet Outside to Inside Enclave
Perform the following to check for FTP or Telnet outside the enclave:
# last | more
If any FTP or Telnet connections are found, examine the third field and ask the SA if the initiating client is
outside of the enclave. If it is, then this is a finding.
PDI:
GEN004760V001200 Category I
8
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
FTP or telnet from outside the enclave into the enclave is
enabled and not within requirements.
Reference:
UNIX STIG: 4.8
3. GEN004780 – FTP or Telnet Userids and Passwords
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 200
Perform the following to check for FTP:
#
more /etc/passwd
Make a note of any user accounts with administrative privileges by verifying the third field is set to 0 and then
perform the following.
#
more /etc/ftpd/ftpusers
Ensure that any root privileged user or user’s with any root roles is listed in the ftpusers file.
In addition perform the following to check for both ftp and telnet logins under root:
#
last |more
Verify that root has not logged in with telnet or ftp. If they have, then this is a finding.
PDI:
GEN004780V001200 Category I
9
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
FTP or telnet userids/passwords have administrative or root
privileges.
Reference:
UNIX STIG: 4.8
4. GEN004800 – Unencrypted FTP or Telnet
Perform the following to determine if unencrypted ftp or telnet are enabled on most systems:
#
grep ftp /etc/inetd.conf
#
grep telnet /etc/inetd.conf
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 201
Solaris 10
#
svcs ftp
#
svcs telnet
Linux
#
chkconfig telnet
#
chkconfig vsftpd
If any of the above are found to be active, ask the SA if any type of encryption is being used with these services.
If it is not encrypted and an Acceptance of Risk Letter is not present, then this is a finding.
PDI:
GEN004800V001201 Category:II
0
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECNK-1
PDI Description:
An AORL is not used to document the use of unencrypted FTP or
telnet or the risk is not accepted as part of the accreditation
package.
Reference:
UNIX STIG: 4.8
5. GEN004820 – Anonymous FTP
Perform the following to determine if a system is capable of anonymous ftp:
#
ps –ef |grep ftpd
# grep ftp /etc/passwd
Use the command ftp to activate the ftp service. Attempt to log into this host with a user name of anonymous
and a password of guest (also try the password of [email protected]). If the logon is successful, ask if the use of
anonymous FTP on the system is documented with the IAO. If it is not, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 202
GEN004820V000084 Category II
6
:
MAC/Confidentiality Levels:
Status Code:PART
Previously:
G147
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSD-1
PDI Description:
Anonymous FTP is active and not documented by the IAO.
Reference:
UNIX STIG: 4.8
6. GEN004840 – Anonymous FTP Segregation into DMZ
Perform the following to determine if a system is capable of anonymous ftp:
#
ps –ef |grep ftpd
# grep ftp /etc/passwd
Ask the SA if the server is on a separate subnet located in a DMZ. If it is not, then this is a finding.
PDI:
GEN004840V000470 Category II
2
:
MAC/Confidentiality Levels:
Status Code:PART
Previously:
V052
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1
PDI Description:
Anonymous FTP is not segregated into the network DMZ.
Reference:
UNIX STIG: 4.8
10. FTP Configuration
1. GEN004880 – The ftpusers File
Perform the following to determine if the ftpusers file exist:
#
ls –la <ftpusers file>
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 203
where <ftpusers file> is one of the files listed below.
Locations of the ftpusers file:
Solaris 5.5.1 – 5.8
Solaris 5.9 –5.10
/etc/ftpusers
/etc/ftpd/ftpusers
HPUX 10
/etc/ftpusers
HPUX 11
/etc/ftpd/ftpusers
AIX
/etc/ftpusers
Linux (wu-ftp)
/etc/ftpusers
Linux (vsftpd)
/etc/vsftpd.ftpusers
IRIX
/etc/ftpd/ftpusers
If the ftpusers files does not exist, then this is a finding.
PDI:
GEN004880V000084 Category:II
0
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G140
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSL-1
PDI Description:
The ftpusers file does not exist.
Reference:
UNIX STIG: 4.8.1
2. GEN004900 – The ftpusers File Contents
Check for system accounts in the ftpusers files which should not be allowed to used ftp by:
#
more /etc/ftpusers
Locations of the ftpusers file:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Solaris 5.5.1 – 5.8
Solaris 5.9 –5.10
Page 204
/etc/ftpusers
/etc/ftpd/ftpusers
HPUX 10
/etc/ftpusers
HPUX 11
/etc/ftpd/ftpusers
AIX
/etc/ftpusers
Linux (wu-ftp)
/etc/ftpusers
Linux (vsftpd)
/etc/vsftpd.ftpusers
IRIX
/etc/ftpd/ftpusers
If system accounts are not listed in the ftpusers file, then this is a finding.
PDI:
GEN004900V000084 Category:II
1
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G141
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSL-1
PDI Description:
The ftpusers file does not contain account names not allowed to
use FTP.
Reference:
UNIX STIG: 4.8.1
3. GEN004920 – The ftpusers File Ownership
Perform the following on the ftpusers file associated with the applicable operating system:
#
ls –la <file location>
Locations of the ftpusers file:
Solaris 5.5.1 – 5.8
Solaris 5.9 –5.10
HPUX 10
/etc/ftpusers
/etc/ftpd/ftpusers
/etc/ftpusers
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
HPUX 11
AIX
Page 205
/etc/ftpd/ftpusers
/etc/ftpusers
Linux (wu-ftp)
/etc/ftpusers
Linux (vsftpd)
/etc/vsftpd.ftpusers
IRIX
/etc/ftpd/ftpusers
If the file is not owned by root, then this is a finding.
PDI:
GEN004920V000084 Category:II
2
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G142
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The ftpusers file is not owned by root.
Reference:
UNIX STIG: 4.8.1
4. GEN004940 – The ftpusers File Permissions
Perform the following on the ftpusers file associated with the applicable operating system:
#
ls –la <file location>
Locations of the ftpusers file:
Solaris 5.5.1 – 5.8
Solaris 5.9 –5.10
/etc/ftpusers
/etc/ftpd/ftpusers
HPUX 10
/etc/ftpusers
HPUX 11
/etc/ftpd/ftpusers
AIX
/etc/ftpusers
Linux (wu-ftp)
/etc/ftpusers
Linux (vsftpd)
/etc/vsftpd.ftpusers
IRIX
/etc/ftpd/ftpusers
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 206
If the file permissions are greater than 640, then this is a finding
PDI:
GEN004940V000084 Category:II
3
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G143
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The ftpusers file is more permissive than 640.
Reference:
UNIX STIG: 4.8.1
5. GEN004980 – FTP Daemon Logging
Perform:
# grep ftpd /etc/inetd.conf ,
and check the line for ftpd to check if the –l (HP-UX, Solaris, AIX, and Digital) or –v (HP-UX) options are
invoked. If not, then this is a finding.
Solaris 10:
#
svccfg
svc:>
export ftp
svc:>
quit
Verify the line that contains /usr/sbin/in.ftpd contains the –l option.
On Linux systems:
#
grep log /etc/xinetd.d/vsftpd
If either the log_on_success or log_on_failure are commented out, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 207
GEN004980V000084 Category:III
5
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G145
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSL-1
PDI Description:
The FTP daemon is not configured for logging or verbose mode.
Reference:
UNIX STIG: 4.8.1
6. GEN005000 – Anonymous FTP Account Shell
Perform the following to check for anonymous FTP:
#
grep “^ftp” /etc/passwd
If the sixth field does not contain one of the following:
/bin/false , /dev/null , /usr/bin/false , /bin/true , or the entry ends with a ‘:’, this check will
be a finding.
PDI:
GEN005000V000438 Category I
7
:
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G649
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
There is an anonymous FTP account with a functional shell.
Reference:
UNIX STIG: 4.8.1
7. GEN005020 – Anonymous FTP Configuration
First, determine if there is an anonymous ftp account by:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 208
#
grep “^ftp:” /etc/passwd
If there is no output, mark this check as Not a Finding.
Change to the ftp home directory.
#
ls –lL <ftp home directory>
It should be writable by no one (555). The following directories must exist in the account: /etc , and /bin
with permissions of (111). The /<ftp home directory> /etc directory will only contain password,
group and netgroup files but can be empty. The / <ftp home directory> /bin directory should be a
symbolic link to the /<ftp home directory>/ usr/bin directory in the ftp account and contain only a
copy of the ls command. There must be a /<ftp home directory>/ usr/lib directory owned by root
with permissions of (555). The /<ftp home directory>/usr/lib directory should contain the
following libraries with permissions of ( 555): ld.so.1 , libc.so.1 , libdl.so.1 , libmp.so.2 ,
libnsl.so.1 , libsocket.so.1 , nss_compat.so.1 , nss_dns.so.1 , nss_files.so.1 ,
nss_nis.so.1 , nss_nisplus.so.1 , and nss_xfn.so.1 . Other requirements include:
~ftp/etc will be owned by the superuser and not writable by anyone. The following files will be
there: copies of the files passwd, group, and netconfig files. The permissions will be 444 .
~ftp/pub will be owned by root with permissions of 755. Users may place files, which are to be
accessible via the anonymous account, in this directory.
~ftp/dev will be owned by root and not writable by anyone . It will contain the following files:
/dev/zero, /dev/tcp, /dev/udp and /dev/ticotsord . The permissions for these
files should be 666.
~ftp/usr/share/lib/zoneinfo will be owned by root with permissions of 555. It should have
the same contents as /usr/share/lib/zoneinfo .
Secuirty: For Linux, Solaris 8 and newer, in.ftpd uses pam (3PAM) for authentication, account and session
management. Here is a partial pam.conf file with required entries for the in.ftpd command using UNIX
authentication, account management, and session management modules.
ftp
auth
required
/usr/lib/security/pam_unix.so.1
ftp
account
required
/usr/lib/security/pam_unix.so.1
ftp
session
required
/usr/lib/security/pam_unix.so.1
PDI:
GEN005020V000438 Category I
8
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G650
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 209
IA Controls:
DCCS-1, DCCS-2
PDI Description:
Anonymous FTP is not configured using all security
recommendations.
Reference:
UNIX STIG: 4.8.1
8. GEN005040 – FTP User’s umask
To determine the umask of the ftp user, perform the following:
# su – ftp
# umask
If the umask value does not return 077, then this is a finding.
PDI:
GEN005040V001201 Category:II
1
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
An FTP user’s umask is not 077.
Reference:
UNIX STIG: 4.8.1
11. File Service Protocol (FSP)
1. GEN005060 – FSP Is Enabled
To determine if fsp is enabled, perform the following:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
#
Page 210
grep in.fspd /etc/inetd.conf
# netstat –an |grep fspd
If an entry for fsp is found, then this is considered a finding.
PDI:
GEN005060V001201 Category I
3
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
FSP is enabled.
Reference:
UNIX STIG: 4.9
12. Trivial File Transfer Protocol (TFTP)
1. GEN005080 – TFTP Secure Mode
Perform the following to determine if the system is running in tftp in secure mode:
Solaris
#
grep tftp /etc/inetd.conf | grep “-s”
HP-UX tftpd runs in secure mode by default, therefore this is not applicable.
AIX
#
more /etc/tftpaccess.ctl
If the file does not exist, then this is a finding. Ensure the only entry is to allow access to the tftp user home
directory.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 211
Linux
#
grep server_args /etc/xinetd.d/tftp |grep “-s”
IRIX
#
grep tftp /etc/inetd.conf | grep “-s”
If TFTP is not running in secure mode, then this is a finding.
PDI:
GEN005080V000084 Category I
7
:
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G149
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSL-1
PDI Description:
The TFTP daemon is not running in secure mode.
Reference:
UNIX STIG: 4.10
2. GEN005100 – TFTP SUID/SGID Bit
Perform :
#
find / - name “*tftpd” –print
to locate the file. Once the file is located, use the command:
# ls –la <file location>
to check for the suid or sgid bit being set. If either of the bits are set, then this is a finding.
PDI:
GEN005100V000084 Category I
8
:
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G150
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 212
IA Controls:
ECLP-1
PDI Description:
The TFTP daemon has the suid or sgid bit set.
Reference:
UNIX STIG: 4.10
3. GEN005120 – TFTP Configuration
Check the /etc/passwd file to determine if TFTP is configured properly:
#
grep tftp /etc/passwd
If a tftp user account does not exist and TFTP is active, then this is a finding.
Ensure the user shell is /bin/false or equivalent. If it is not, then this is a finding.
Ensure the TFTP user is assigned a home directory . If not, then this is a finding.
PDI:
GEN005120V000084 Category:II
9
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G151
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
TFTP is not configured to vendor specifications, including the
following:
A TFTP user will be created.
The default shell will be set /bin/false, or equivalent.
A home directory owned by the TFTP user will be created.
Reference:
UNIX STIG: 4.10
4. GEN005140 – TFTP Documentation
Perform the following to determine if TFTP is active:
Solaris, HP-UX, AIX, IRIX
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 213
#
grep –v “^#” /etc/inetd.conf |grep tftp
Solaris 10
#
svcs tftp
Linux
#
chkconfig –-list | grep tftp
Or
#
chkconfig tftp
If TFTP is found to enabled, ask the SA if it is documented with the IAO. This is a finding if it is not
documented.
PDI:
GEN005140V000469 Category I
5
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
V141
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
TFTP is active and it is not justified and documented with the
IAO.
Reference:
UNIX STIG: 4.10
13. X Window System
1. GEN005160 – .Xauthority Files
To check for .Xauthority files being utilized, change directory to a user’s home directory and perform:
#
ls –la .Xauthority
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 214
If the file does not exist, ask the SA if the user is using Xwindows. If the user is utilizing Xwindows and
the .Xauthority file does not exist and host based access control is not being used, then this is a finding.
PDI:
GEN005160V000085 Category II
0
:
MAC/Confidentiality Levels:
Status Code:PART
Previously:
G152
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
EBCR-1, EBRP-1, EBRU-1
PDI Description:
An X Windows host does not write .Xauthority files (or
equivalent).
Reference:
UNIX STIG: 4.11
2. GEN005180 – .Xauthority File Permissions
Check the file permissions for the .Xauthority files by:
#
ls –lL .Xauthority
If the file permissions are greater than 600, then this is finding.
PDI:
GEN005180V001201 Category:II
4
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-2
PDI Description:
.Xauthority files are more permissive than 600.
Reference:
UNIX STIG: 4.11
3. GEN005200 – X Displays Exporting
Perform the following to determine if access to the X window system is limited to authorized clients:
#
xhost
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 215
If the above command returns:
“access control disabled, clients can connect from any host”, then this is a finding.
PDI:
GEN005200V000469 Category:I
7
MAC/Confidentiality Levels:
Status Code:PART+
Previously:
V155
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECIC-1
PDI Description:
A system is exporting X displays to the world.
Reference:
UNIX STIG: 4.11
4. GEN005220 – X Client Authorization via X*.hosts
Perform the following to determine if the X server is running:
# ps –ef |grep X
Determine if xauth is being used by:
#
xauth
xauth>
list
If the above command sequence does not show any host other than the localhost, then xauth is not being used.
Search the system for an X*.hosts files, where * is a display number that may be used to limit X window
connections. If none are found and user based access control is not being used, then this is a finding.
PDI:
GEN005220V001201 Category:II
6
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 216
IA Controls:
ECIC-1
PDI Description:
Authorized X clients are not listed in the X*.hosts (or equivalent)
file(s) if the .Xauthority utility is not used.
Reference:
UNIX STIG: 4.11
5. GEN005240 – X Client Authorization
Perform the following to determine if access to the X window system is limited to authorized clients:
#
xauth
xauth> list
Ask the SA if the clients listed are authorized. If they are not, then this is a finding.
PDI:
GEN005240V001201 Category II
7
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECIC-1
PDI Description:
Access to the X-terminal host is not limited to authorized X
clients.
Reference:
UNIX STIG: 4.11
6. GEN005260 – X Window System Not Required and Not Disabled
Determine if the X window system is running by:
# ps –ef |grep X
Ask the SA if the X window system is an operational requirement. If it is not, then this is a finding.
PDI:
GEN005260V001201 Category:II
8
http://s3.amazonaws.com/0706/819143.html
Status Code: PART
Previously:
N/A
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 217
MAC/Confidentiality Levels:
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECIC-1
PDI Description:
The X Window System connections are not required and the
connections are not disabled.
Reference:
UNIX STIG: 4.11
14. UNIX to UNIX Copy Program (UUCP)
1. GEN005280 – Disable UUCP
Perform the following to determine if uucp is active.
Solaris, HP-UX, AIX and IRIX
# grep uucp /etc/inetd.conf
Solaris 10
# svcs uucp
Linux
# chkconfig uucp
Or
#
chkconfig –-list | grep uucp
If UUCP is found to be enabled, then this is a finding.
PDI:
GEN005280V000469 Category:II
6
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
V145
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 218
IA Controls:
ECIC-1
PDI Description:
The UUCP service is enabled.
Reference:
UNIX STIG: 4.12
15. Simple Network Management Protocol (SNMP)
1. GEN005300 – Changed SNMP Community Strings
Find the snmpd.conf by:
# find / -name snmpd.conf –print
# more snmpd.conf
Search for the community name to check if the password was changed to something other than public, private,
snmp-trap or password and which meets the DISA requirements for password construction. The community
string will be in plain text.
PDI:
GEN005300V000099 Category I
3
:
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G224
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1, IAIA-2, IAAC-1, DCCS-1, DCCS-2
PDI Description:
SNMP community strings have not been changed from the
default.
Reference:
UNIX STIG: 4.13
2. GEN005320 – snmpd.conf Permissions
Perform:
# find / -name snmpd.conf
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 219
# ls –lL <snmpd.conf>
If the snmpd.conf file is more permissive than 700, then this is a finding.
PDI:
GEN005320V000099 Category:II
4
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G225
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The snmpd.conf file is more permissive than 700.
Reference:
UNIX STIG: 4.13
3. GEN005340 – MIB File Permissions
Perform the following to find all the Management Information Base (MIB) files on the system:
# find / -name *.mib –print
# ls –lL <mib file>
Any file returned with permissions greater than 640 is a finding.
PDI:
GEN005340V000099 Category II
5
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G226
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The MIB files are more permissive than 640.
Reference:
UNIX STIG: 4.13
4. GEN005360 – snmpd.conf and .mib Ownership
Perform:
# find / -name snmpd.conf
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 220
# ls –lL <snmpd.conf>
# find / -name *.mib
If the snmpd.conf file is not owned by root and group owned by sys or the application, then this is a finding.
PDI:
GEN005360V001201 Category:II
9
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The snmpd.conf and .mib files are not owned by root and group
owned by sys or the application.
Reference:
UNIX STIG: 4.13
5. GEN005380 – Dedicated Hardware for SNMP
To check if SNMP is used, execute the following command:
netstat -a | grep LISTEN | grep snmp .
#
#
netstat –a | grep LISTEN | egrep “161|162”
If there is any output, then ask the SA if this is an snmp server. If it is an snmp server, then ask what other
applications run on it. If there is anything other than network management software and DBMS software that is
used only for the storage and inquiry of snmp data, this is a finding.
PDI:
GEN005380V000439 Category II
2
:
MAC/Confidentiality Levels:
Status Code:MAN
Previously:
G655
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
SNMP does not run on dedicated hardware.
Reference:
UNIX STIG: 4.13
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 221
16. System Logging Daemon
1. GEN005400 – /etc/syslog.conf Assessiblity
Check /etc/syslog.conf ownership and permissions:
# ls –lL /etc/syslog.conf
If /etc/syslog.conf is not owned by root or is more permissive than 640, then this is a finding.
PDI:
GEN005400V000439 Category:II
3
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G656
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The /etc/syslog.conf file is not owned by root or is more
permissive than 640.
Reference:
UNIX STIG: 4.14
2. GEN005420 – /etc/syslog.conf Group Ownership
Check /etc/syslog.conf group ownership:
# ls –lL /etc/syslog.conf
If /etc/syslog.conf is not group owned by root, sys, or bin, then this is a finding.
PDI:
GEN005420V000439 Category:II
4
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G657
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The /etc/syslog.conf file is not group owned by root, sys, or bin.
Reference:
UNIX STIG: 4.14
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 222
3. GEN005440 – Local Loghosts
Ask the SA if a remote loghost server exists. If it does not mark this as Not A Finding
Ask the SA if the loghost server is collecting data for hosts outside the enclave. If it is, then this is a finding.
PDI:
GEN005440V001202 Category II
0
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
Local hosts are used as loghosts for systems outside the local
network.
Reference:
UNIX STIG: 4.14
4. GEN005460 – Remote Loghost Documentation
Perform the following to determine if the system is using a remote loghost :
# grep loghost /etc/hosts
If the loghost entry is a remote machine, then ask the SA if the remote machine is documented as a loghost with
the IAO. If it is not documented then this is a finding.
PDI:
GEN005460V000439 Category II
5
:
MAC/Confidentiality Levels:
IA Controls:
Status Code:PART
Previously:
G658
MAC I – CSP, MAC II – CSP, MAC III – CSP
DCHW-1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 223
PDI Description:
A system is using a remote loghost is not documented with the
IAO.
Reference:
UNIX STIG: 4.14
5. GEN005480 – Syslog Accepts Remote Messages
Perform the following to determine if syslogd accepts remote messages:
Solaris
# ps –ef | grep syslogd
If the ‘-t ’ option is not enabled, then ask the SA if it is documented.
HP-UX
#
ps –ef |grep syslogd
If the ‘-N ’ option is not enabled, then ask the SA if it is documented.
Linux
#
ps –ef | grep syslogd
If the ‘-r’ is enabled, then ask the SA if it is documented.
AIX
#
ps –ef | grep syslogd
If the ‘-r’ is not enabled, then ask the SA if it is documented.
IRIX
#
ps –ef | grep syslogd
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 224
If the ‘-N’ option is not enabled, then ask the SA if it is documented.
If syslog accepts remote messages, then this is a finding.
PDI:
GEN005480V001202 Category:II
1
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
The syslog daemon accepts remote messages and is not an IAO
documented loghost.
Reference:
UNIX STIG: 4.14
17. Secure Shell (SSH) and Equivalents
1. GEN005500 – SSH Version 1 Compatibility
Locate the sshd_config file:
# find / -name sshd_config
#
more <sshd_config file location>
Examine the file. If the variables ‘Protocol 2,1’ or, ‘ Protocol 1’ are defined on a line without a leading
comment, this is a finding.
If the SSH server is F-Secure, the variable name for SSH 1 compatibility is ‘Ssh1Compatibility’, not ‘protocol’.
If the variable ‘Ssh1Compatiblity’ is set to ‘yes’, then this is a finding.
PDI:
GEN005500V000429 Category I
5
:
MAC/Confidentiality Levels:
IA Controls:
Status Code:AUTO
Previously:
G701
MAC I – CSP, MAC II – CSP, MAC III – CSP
DCPR-1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 225
PDI Description:
SSH, or a similar utility, is running and SSHv1 compatibility is
used.
Reference:
UNIX STIG: 4.15
2. GEN005540 – Encrypted Communications IP Filtering and Banners
To determine if ssh is configured with tcp wrappers support perform the following:
#
grep sshd /etc/hosts.deny
For example:
sshd1: ALL
sshd2: ALL
sshdfwd-X11 : ALL
If the above lines or similar are not in /etc/hosts.deny , then this is a finding.
Perform the following to determine if banners are configured:
#
find / -name sshd_config
#
more <sshd_config file location> | grep –I banner
If the above command does not return any lines, then this is a finding.
PDI:
GEN005540V001202 Category:II
2
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
Encrypted communications are not configured for IP filtering and
logon warning banners.
Reference:
UNIX STIG: 4.15
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 226
18. UNIX Routing Vulnerabilities
1. GEN005560 – Default Gateway
Perform the following to determine if a default route is defined:
#
netstat –r |grep default
If a default route is not defined, then this is a finding.
PDI:
GEN005560V000439 Category:II
7
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G661
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The system is not a router and has no default gateway defined.
Reference:
UNIX STIG: 4.16
2. GEN005580 – Dedicated Hardware for Routing
Perform the following to determine if the systems is used for routing:
#
netstat –a | grep –i listen | grep route
Ask the SA if the system is used for any other services such as web servers, file servers, DNS servers, or
applications servers. If it is used for another service, then this is a finding.
PDI:
GEN005580V000439 Category II
8
:
http://s3.amazonaws.com/0706/819143.html
Status Code:PART
Previously:
G662
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 227
MAC/Confidentiality Levels:
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
Routing is not implemented on dedicated hardware and not
documented with the IAO.
Reference:
UNIX STIG: 4.16
3. GEN005600 – Disable IP Forwarding
Perform the following to determine if IP forwarding is disabled:
Solaris
#
ls –l /etc/notrouter
If the file does not exist, then this is a finding.
HP-UX
#
grep ip_forwarding /etc/rc.config.d/nddconf
If the value is not set to ‘0’, then this is a finding.
AIX
IP forwarding is disabled by default in AIX.
IRIX
#
grep ipforward /var/sysgen/stune
If the value is not set to ‘0’, then this is a finding.
Linux
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
#
Page 228
grep ip_forward /etc/sysctl.conf
If the value is set to 1, then this is a finding.
PDI:
GEN005600V001202 Category:II
3
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCC|S-2
PDI Description:
IP forwarding is not disabled.
Reference:
UNIX STIG: 4.16
19. Lotus Domino Web Application
1. GEN005620 – Lotus Domino Version
To determine the version of Lotus Domino perform the following:
#
/opt/lotus/bin/server –v
The version should be 5.0.6a or higher for Linux, and the transition components for AIX and Solaris should be
version 2.1.1.
If version is not one of the above, then this is a finding.
PDI:
GEN005620V000470 Category III
3
:
MAC/Confidentiality Levels:
Status
Code:
AUTO
Previously:
V5899
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DSCQ-1
PDI Description:
A Lotus Domino 5.0.5 Web Application was found vulnerable to
the .nsf, .box, and .ns4 directory traversal exploit.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 229
Reference:
UNIX STIG: 4.17
20. Squid Web Proxy Authentication Header
1. GEN005640 – Squid Web Proxy Authentication Header Vulnerability
Perform the following to determine if the squib web proxy is a vulnerable version:
#
squid –v |grep –i version
If the version is not greater than 2.4STABLE6, then this is a finding.
PDI:
GEN005640V000470 Category III
6
:
MAC/Confidentiality Levels:
Status
Code:
AUTO
Previously:
V9478
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DSCQ-1
PDI Description:
A system running Squid Web Proxy Cache server was found
vulnerable to the authentication header forwarding exploit.
Reference:
UNIX STIG: 4.18.1
21. Squid Web Proxy MSNT Auth Helper
1. GEN005660 – Squid Web Proxy MSNT Auth Helper Vulnerability
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 230
Perform the following to determine if the squib web proxy is a vulnerable version:
#
squid –v |grep –i version
If the version is not greater than 2.4STABLE6, then this is a finding.
PDI:
GEN005660V000470 Category II
7
:
MAC/Confidentiality Levels:
Status
Code:
AUTO
Previously:
V9482
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DSCQ-1
PDI Description:
A system running Squid Web Proxy Cache was found vulnerable
to the MSNT auth helper buffer overflow exploit.
Reference:
UNIX STIG: 4.18.2
22. Squid Web Proxy Version
1. GEN005680 – Squid Web Proxy Version
Perform the following to determine if the squib web proxy is a vulnerable version:
#
squid –v |grep –i version
If the version number is not at least 2.7STABLE7 or later then this is a finding.
PDI:
GEN005680V000470 Category III
9
:
MAC/Confidentiality Levels:
IA Controls:
Status
Code:
AUTO
Previously:
V9730
MAC I – CSP, MAC II – CSP, MAC III – CSP
DSCQ-1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 231
PDI Description:
The SA will ensure the Squid Proxy Cache server is not a
vulnerable version.
Reference:
UNIX STIG: 4.18.3
23. iPlanet Web Server
1. GEN005700 – iPlanet Web Server NS-query-pat Vulnerability
Use the following steps to determine the version number:
1. Navigate to the following directory:
server-root /bin/https/bin
2. Run the ns-httpd program with the "-v " parameter.
#
./ns-httpd –v
Ask the SA for documentation showing the installation of either service pack 3 for iPlanet Web Server 6, or
service pack 10 for iPlanet Web Server 4.1.
PDI:
GEN005700V000470 Category III
8
:
MAC/Confidentiality Levels:
Status
Code:
PART
Previously:
V9517
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DSCQ-1
PDI Description:
An iPlanet Web Server was found with the search engine NSquery-pat file viewing vulnerability.
Reference:
UNIX STIG: 4.19
24. Network Filesytem (NFS)
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 232
1. GEN005720 – NFS Port Monitoring
Perform the following for each operating system to determine if NFS port monitoring is is set to ‘1’:
Solaris
#
grep nfs_portmon /etc/system
HP-UX
#
kctune nfs_portmon
#
nfso –o nfs_portmon
#
nfso –o portcheck
#
grep nfs_portmon /var/sysgen/stune
AIX
Or
IRIX
Linux does not use nfs_portmon. By default, it exports with the –secure option which is the same as nfs_
portmon. Perform the following to determine if the default has been overridden:
#
grep insecure /etc/exports
If any of the file systems are exported with the ‘insecure’ option, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 233
GEN005720V000092 Category:II
7
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G177
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSL-1
PDI Description:
NFS port monitoring is not enabled.
Reference:
UNIX STIG: 4.20
2. GEN005740 – Export Configuration File Ownership
Solaris
# ls –lL /etc/dfs/dfstab
HP-UX
# ls –lL /etc/exports
AIX
# ls –lL /etc/exports
IRIX
# ls –lL /etc/exports
Linux
# ls –lL /etc/exports
If the export configuration file is not owned by root, then this is a finding.
PDI:
GEN005740V000092 Category:II
8
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G178
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 234
IA Controls:
ECLP-1
PDI Description:
The export configuration file is not owned by root.
Reference:
UNIX STIG: 4.20
3. GEN005760 – Export Configuration File Permissions
Solaris
# ls –lL /etc/dfs/dfstab
HP-UX
# ls –lL /etc/exports
AIX
# ls –lL /etc/exports
IRIX
# ls –lL /etc/exports
Linux
# ls –lL /etc/exports
If the export configuration file is more permissive than 644, then this is a finding.
PDI:
GEN005760V000092 Category III
9
:
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G179
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The export configuration file is more permissive than 644.
Reference:
UNIX STIG: 4.20
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 235
4. GEN005780 – Writable Exported File Systems Documentation
Perform the following to determine if NFS File Systems are writeable:
#
exportfs –v |grep rw
If any entries are returned, ask the SA if the file systems have been approved and documented with the IAO for
export as writable.
PDI:
GEN005780V000093 Category II
0
:
MAC/Confidentiality Levels:
Status Code:PART
Previously:
G180
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSD-1
PDI Description:
NFS file systems exported as writeable have not been justified
and documented by the IAO.
Reference:
UNIX STIG: 4.20
5. GEN005800 – Exported System Files and Directories Ownership
Perform the following to check for NFS exported files systems:
#
exportfs –v
This will display all of the exported file systems. For each file system displayed perform and check the
ownership:
# ls –lL <filesystem>
If the files and directories are not owned by root, then this is a finding.
PDI:
GEN005800V000093 Category:II
1
http://s3.amazonaws.com/0706/819143.html
Status Code:AUTO
Previously:
G181
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 236
MAC/Confidentiality Levels:
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
NFS exported system files and system directories are not owned
by root.
Reference:
UNIX STIG: 4.20
6. GEN005820 – Deny NFS Client Access Without Userid
Perform the following to determine if the ‘anon’ option is set correctly for exported file systems:
#
exportfs –v |grep anon
Each of the exported file systems should include an entry to check for the ‘ anon= ‘option being set to –1 or an
equivalent (60001, 65534, or 65535). Linux systems use the ‘anonuid’ option instead of ‘anon’.
Note: If the anon flag is found to have a UID of 0 , this finding is elevated to a Severity Code I.
PDI:
GEN005820V000093 Category:II
2
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G182
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAIA-1, IAIA-2
PDI Description:
The NFS server is not configured to deny client access requests
that do not include a userid.
Reference:
UNIX STIG: 4.20
7. GEN005840 – Restrict NFS Filesystem Access to Local Hosts
Perform the following to check for access permissions:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
#
Page 237
exportfs –v
If the exported filesystems do not contain the ‘rw’ or ‘ro’ options, then this is a finding.
PDI:
GEN005840V000093 Category:II
3
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G183
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
EBCR-1, EBRP-1, EBRU-1
PDI Description:
The NFS server is not configured to restrict filesystem access to
local hosts.
Reference:
UNIX STIG: 4.20
8. GEN005860 – NFS User Authentication
This check only applies to Solaris. Perform the following on NFS servers:
#
grep “^default” /etc/nfssec.conf
Check to ensure the second column does not equal ‘0’. This would indicate the default is set to none. Perform
the following to check currently exported file systems:
#
more /etc/exports
#
more /etc/dfs/dfstab
Or
If the option ‘sec=none’ is set on any of the exported file systems, then this is a finding.
PDI:
GEN005860V000093 Category:II
4
MAC/Confidentiality Levels:
IA Controls:
Status Code:AUTO
Previously:
G184
MAC I – CSP, MAC II – CSP, MAC III – CSP
IAIA-1, IAIA-2
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 238
PDI Description:
The sec option is set to none (or equivalent); additionally the
default authentication is to none .
Reference:
UNIX STIG: 4.20
9. GEN005880 – Root Access Option Documentation
Perform the following to determine if the NFS server is exporting with the root access option:
#
exportfs –v | grep “root=”
If the option is found on an exported file system, ask the SA if the access is justified and documented with the
IAO. If it is not, then this is a finding.
PDI:
GEN005880V000093 Category II
5
:
MAC/Confidentiality Levels:
Status Code:PART
Previously:
G185
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSD-1
PDI Description:
The root access option for NFS has not been justified and
documented with the IAO.
Reference:
UNIX STIG: 4.20
10. GEN005900 – NFS Clients Enable nosuid and nosgid
Perform the following to determine if nfs clients are mounting file systems with the nosuid and nosgid options:
#
mount –v | grep " type nfs " | grep "nosuid"
#
mount –v | grep " type nfs " | grep "nosgid"
If the mount ed file systems do not have the above two options, then this is a finding and it must be justified and
documented with the IAO.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 239
GEN005900V000093 Category II
6
:
MAC/Confidentiality Levels:
Status Code:PART
Previously:
G186
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The nosuid and nosgid options are not enabled on a NFS Client.
Reference:
UNIX STIG: 4.20
25. Instant Messaging (IM)
1. GEN006000 – Public Instant Messaging Client is Installed
If an IM client is installed, ask the SA if it configured to communicate only with .mil IM servers. If it has access
to servers on the internet, then this is a finding.
PDI:
GEN006000V001202 Category II
4
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECIC-1
PDI Description:
A public instant messaging client is installed.
Reference:
UNIX STIG: 4.22
26. Peer-to-Peer File-Sharing Utilities and Clients
1. GEN006040 – Peer-to-Peer Application Authorization with DAA
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 240
Ask the SA if any peer-to-peer file-sharing applications are installed. Some examples of these applications
include:
Napster
Kazaa
ARES
Limewire
IRC Chat Relay
BitTorrent
If any of these applications are installed without an Acceptance of Risk Letter from the DAA, then this is a
finding.
PDI:
GEN006040V001202 Category II
5
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECIC-1
PDI Description:
A peer-to-peer file-sharing application is installed and not
authorized and documented with the DAA.
Reference:
UNIX STIG: 4.23
27. Samba
1. GEN006060 – Samba is Enabled
Perform the following to determine if the Samba server is running:
#
ps –ef |grep smbd
If a process is returned as running, ask the SA if the Samba server is operationally required. If it is not, then this
is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 241
GEN006060V000432 Category:II
1
MAC/Confidentiality Levels:
Status Code:PART
Previously:
L170
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCPR-1
PDI Description:
Samba is running and is not operationally required.
Reference:
UNIX STIG: 4.24
2. GEN006080 – Samba Web Administration with SSH Port Forwarding
SWAT must be utilized with ssh to ensure a secure connection between the client and the server. The ssh
daemon on the server must be configured to allow port forwarding. If SWAT is being utilized to administer
Samba on the server, perform the following:
#
grep AllowTcpForwarding /etc/ssh/sshd_config
If the line is commented out or set to ‘no’ and SWAT is in use, then this is a finding.
PDI:
GEN006080V000102 Category:II
6
MAC/Confidentiality Levels:
Status Code:PART
Previously:
L048
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCPR-1
PDI Description:
The Samba Web Administration tool is not used with SSH port
forwarding.
Reference:
UNIX STIG: 4.24
3. GEN006100 – smb.conf Ownership
Check /etc/samba/smb.conf ownership:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 242
# ls –lL /etc/samba/smb.conf
If /etc /samba /smb.conf is not owned by root, then this is a finding.
PDI:
GEN006100V000102 Category:II
7
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
L050
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The smb.conf file is not owned by root.
Reference:
UNIX STIG: 4.24
4. GEN006120 – smb.conf Group Ownership
Check /etc/samba/smb.conf permissions:
# ls –lL /etc/samba/smb.conf
If /etc /samba /smb.conf is not group owned by root, then this is a finding.
PDI:
GEN006120V000105 Category:II
6
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
L051
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCPR-1
PDI Description:
The smb.conf file is not group owned by root.
Reference:
UNIX STIG: 4.24
5. GEN006140 – smb.conf Permissions
Check /etc/samba/smb.conf permissions:
# ls –lL /etc/samba/smb.conf
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 243
If /etc /samba /smb.conf is more permissive than 644, then this is a finding.
PDI:
GEN006140V000102 Category:II
8
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
L052
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The smb.conf file is more permissive than 644.
Reference:
UNIX STIG: 4.24
6. GEN006160 – smbpasswd Ownership
Check /etc/samba/smbpasswd ownership:
# ls –lL /etc/samba/smbpasswd
If /etc /samba /smbpasswd is not owned by root, then this is a finding.
PDI:
GEN006160V000102 Category:II
9
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
L054
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The smbpasswd file is not owned by root.
Reference:
UNIX STIG: 4.24
7. GEN006180 – smbpasswd Group Ownership
Check /etc/samba/smbpasswd ownership:
# ls –lL /etc/samba/smbpasswd
If /etc /samba /smbpasswd is not group owned by root, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 244
GEN006180V000105 Category:II
8
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
L055
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The smbpasswd file is not group owned by root.
Reference:
UNIX STIG: 4.24
8. GEN006200 – smbpasswd Per missions
Check /etc/samba/smbpasswd permissions:
# ls –lL /etc/samba/smbpasswd
If /etc /samba /smbpasswd is more permissive than 600, then this is a finding.
PDI:
GEN006200V000105 Category:II
9
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
L057
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The smbpasswd file is more permissive than 600.
Reference:
UNIX STIG: 4.24
9. GEN006220 – smb.conf Configuration
Perform:
# more /etc/samba/smb.conf
1. Confirm the hosts allow restricts connections to the local network subnet mask(s) and the loopback
address. For example:
hosts allow = 192.168.1. 192.168.2. 127.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 245
2. The security option will be set to user . For example:
security = user
3. The encrypt passwords option will be set to y es . In addition, the smb password file option will
contain the path to the smbpasswd file. For example:
encrypt passwords = yes
smb passwd file = /etc/samba/smbpasswd
4. All guest entries in the shares definition section of the smb.conf file will be set to No . For example:
guest ok = no
If the smb.conf file is not configured per guidance, then this is a finding.
PDI:
GEN006220V000103 Category:II
0
MAC/Confidentiality Levels:
Status Code:PART
Previously:
L056
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSS-1 DCCB-1, DCCB-2
PDI Description:
The smb.conf file is not configured to:
Set the hosts allow option to contain only the local
network subnet masks and the loopback address.
Set the security option to user.
Set the encrypt passwords option to yes.
Enter the path to the smbpasswd utility in the smb
password file option.
All guest entries in the shares definition section of
the smb.conf file will be set to no.
Reference:
UNIX STIG: 4.24
28. Internet Network News (INN)
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 246
1. GEN006240 – INN Documentation
Perform:
# ps –e | egrep “innd|nntpd”
If an Internet Network News server is running and not justified and documented by the IAO, then this is a
finding.
PDI:
GEN006240V000102 Category:II
3
MAC/Confidentiality Levels:
Status Code:PART
Previously:
L040
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1, DCSD-1
PDI Description:
An Internet Network News server is not justified and documented
by the IAO.
Reference:
UNIX STIG: 4.25
2. GEN006260 – /etc/news/hosts.nntp Permissions
Check /etc/news/hosts.nntp permissions:
# ls –lL /etc/news/hosts.nntp
If /etc/news/hosts.nntp is more permissive than 600, then this is a finding.
PDI:
GEN006260V000427 Category:II
3
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
L154
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The /etc/news/hosts.nntp file is more permissive than 600.
Reference:
UNIX STIG: 4.25
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 247
3. GEN006280 – /etc/news/hosts.nntp.nolimit Permissions
Check /etc/news/hosts.nntp.nolimit permissions:
# ls –lL /etc/news/hosts.nntp.nolimit
If /etc/news/hosts.nntp.nolimit is more permissive than 600, then this is a finding.
PDI:
GEN006280V000427 Category:II
4
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
L156
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The /etc/news/hosts.nntp.nolimit file is more permissive than 600.
Reference:
UNIX STIG: 4.25
4. GEN006300 – /etc/news/nnrp.access Permissions
Check /etc/news/nnrp.access permissions:
# ls –lL /etc/news/nnrp.access
If /etc/news/nnrp.access is more permissive than 600, then this is a finding.
PDI:
GEN006300V000427 Category:II
5
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
L158
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The /etc/news/nnrp.access file is more permissive than 600.
Reference:
UNIX STIG: 4.25
5. GEN006320 – /etc/news/passwd.nntp Permissions
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 248
Check /etc/news/passwd.nntp permissions:
# ls –lL /etc/news/passwd.nntp
If /etc/news/passwd.nntp is more permissive than 600, then this is a finding.
PDI:
GEN006320V000427 Category:II
6
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
L160
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The /etc/news/passwd.nntp file is more permissive than 600.
Reference:
UNIX STIG: 4.25
6. GEN006340 – /etc/news Files Ownership
Check /etc/news files ownership:
# ls –al /etc/news
If /etc /news files are not owned by root or news, then this is a finding.
PDI:
GEN006340V000427 Category:II
7
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
L162
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The files contained in the /etc/news directory are not owned by
root or news.
Reference:
UNIX STIG: 4.25
7. GEN006360 – /etc/news Files Group Ownership
Check /etc/news files group ownership:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 249
# ls –al /etc/news
If /etc /news files are not group owned by root or news, then this is a finding.
PDI:
GEN006360V000427 Category:II
8
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
L164
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The files contained in the /etc/news directory are not group
owned by root or news.
Reference:
UNIX STIG: 4.25
4. Network Based Authentication
1. Network Information Service (NIS)
1. GEN006380 – NIS/NIS+ Implemented Under UDP
# rpcinfo -p | grep yp | grep udp
If NIS/NIS+ is implemented under UDP, then this is a finding.
PDI:
GEN006380V000439 Category I
9
:
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G663
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
NIS/NIS+ is implemented under UDP.
Reference:
UNIX STIG: 5.1
2. GEN006400 – NIS Documentation
Peform the following to determine if NIS is active one the system:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
#
Page 250
ps –ef |grep ypbind
If NIS is found active on the system, ask the SA if it’s use is documented with the IAO. If NIS use is not
documented, this is a finding.
PDI:
GEN006400V000086 Category II
7
:
MAC/Confidentiality Levels:
Status Code:PART
Previously:
G174
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSD-1
PDI Description:
The NIS protocol is in use and not justified and documented with
the IAO.
Reference:
UNIX STIG: 5.1
3. GEN006420 – NIS Maps Domain Names
To view the domainname for the NIS Maps to be stored under, perform the following:
# domainname
If the name returned is simple to guess, such as the organization name, building or room name, etc., then this is a
finding.
PDI:
GEN006420V001202 Category:II
6
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
NIS maps are not protected through hard-to-guess domain names.
Reference:
UNIX STIG: 5.1
2. Network Information Service Plus (NIS+)
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 251
1. GEN006440 – NIS Used as Opposed to NIS+
To determine if NIS is running on the system perform the following:
#
ps -ef | grep ypbind
If ypbind is running, then NIS running and this is a finding.
PDI:
GEN006440V000086 Category:II
6
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G173
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECCD-1, ECCD-2
PDI Description:
The NIS protocol is used while the NIS+ protocol is available.
Reference:
UNIX STIG: 5.2
2. GEN006460 – NIS+ Server at Security Level 2
Perform the following to determine if security level two is implemented:
# niscat cred.org_dir
If the second column does not contain ‘DES’, then this is a finding.
PDI:
GEN006460V000092 Category:II
6
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G176
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSL-1
PDI Description:
The NIS+ server is not operating at security level 2.
Reference:
UNIX STIG: 5.2
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 252
5. UNIX Security Tools
1. UNIX Security Tools
1. GEN006480 – Host-Based Intrusion Detection Tool
A few applications that provide host-based network intrusion protection are:
Dragon Squire by Enterasys Networks
ITA by Symantec
Hostsentry by Psionic Software
Logcheck by Psionic Software
RealSecure agent by ISS
Swatch by Stanford University
Ask the SA or IAO if a host-based intrusion detection application is loaded on the system. Use the command:
#
find / -name <daemon name> -print
(where <daemon name> is the name of the primary application daemon) to determine if the application is loaded
on the system. Use the command:
#
ps –ef | grep <daemon name>
to determine if the application is active on the system.
PDI:
GEN006480V000078 Category II
2
:
http://s3.amazonaws.com/0706/819143.html
Status Code:PART
Previously:
G031
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 253
MAC/Confidentiality Levels:
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECID-1
PDI Description:
There is no host-based intrusion detection tool.
Reference:
UNIX STIG: 6
2. GEN006540 – System Vulnerabiltiy Assessment Tool
Perform the following to check for a security tool executing monthly:
#
crontab –l
Check for the existence of a vulnerability assessment tool being scheduled and run monthly. If no entries exist in
the crontab, ask the SA if a vulnerability tool is run monthly . In addition, if the tool is run monthly, ask to see
any reports that may have been generated from the tool. If a tool is not run monthly, then this a finding.
PDI:
GEN006540V000093 Category II
9
:
MAC/Confidentiality Levels:
Status Code:PART
Previously:
G190
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
VIVM-1
PDI Description:
A system vulnerability assessment tool is not being run on the
system monthly.
Reference:
UNIX STIG: 6
3. GEN006560 – Security Tool Notifications
Perform:
find / -name (program name) –print
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 254
to check for the existence of security tools on the system. Ask the SA if the program is configured to notify the
IAO and SA if a breach is detected. This check must be justified and documented with the IAO.
PDI:
GEN006560V001202 Category:II
8
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECAT-1, ECAT-2
PDI Description:
The system vulnerability assessment tool, host-based intrusion
detection tool, and file system integrity baseline tool does not
notify the SA and the IAO of a security breach or a suspected
security breach.
Reference:
UNIX STIG: 6
2. Access Control Programs and TCP_WRAPPERS
1. GEN006580 – Access Control Program
To determine if tcp wrappers is installed perform the following:
Solaris, HP-UX , AIX and IRIX
# grep tcpd /etc/inetd.conf
Solaris 10
#
svcprop –p defaults inetd | grep tcp_wrappers
This should return a line with the following:
http://news.tbo.com/news/metro/MGB3WNDK34F.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 255
defaults/tcp_wrappers boolean true
If the above line contains the word false, then this is a finding on Solaris 10.
Solaris 8 or 9
# grep –i enable_tcpwrappers /etc/default/inetd
If the value returned is not set to yes and /etc/inetd.conf does not contain tcpd, then this is a finding.
Linux
# rpm –qa |grep tcpd
or
Check the services in the /etc/xinetd.d directory that are not disabled for an entry containing noaccess or only_
from.
Ensure an entry returns specifically for tcpd, not tcpdump .
PDI:
GEN006580V000094 Category:II
0
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G196
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
EBCR-1, EBRP-1, EBRU-1, IAAC-1
PDI Description:
An access control program is not being used.
Reference:
UNIX STIG: 6.6
2. GEN006600 – Access Control Program Logging
Normally tcpd logs to the mail or daemon facility in /etc/syslog.conf.
determine if syslog is configured to log events by tcpd.
Perform the following to
# more /etc/syslog.conf
Look for entries similar to the following:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 256
mail.debug
/var/adm/maillog
mail.none
/var/adm/maillog
mail.*
/var/log/mail
auth.info
/var/log/messages
daemon.*
/var/log/messages
The above entries would indicate mail alerts are being logged. If no entries for mail exist, then tcpd is not
logging and this is a finding.
PDI:
GEN006600V000094 Category:II
1
MAC/Confidentiality Levels:
Status Code:AUTO
Previously:
G197
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECAN-1, ECAT-1, ECAT-2
PDI Description:
The access control program does not log each system access
attempt.
Reference:
UNIX STIG: 6.6
3. GEN006620 – Access Control Program Control System Access
Check for the existence of /etc/hosts.allow and /etc/hosts.deny:
#
ls –la /etc/hosts.allow
#
ls –la /etc/hosts.deny
# grep “ALL: ALL” /etc/hosts.deny
If the ‘ALL: ALL’ is in the /etc/hosts.deny file, then any tcp service from a host or network not listed in
the /etc/hosts.allow file will not be allowed access. If the entry is not in /etc/hosts.deny or if
either of the two files do not exist, then this is a finding.
PDI:
GEN006620V001203 Category:II
0
MAC/Confidentiality Levels:
IA Controls:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
EBCR-1, EBRP-1, EBRU-1, IAAC-1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 257
PDI Description:
The access control program is not configured to grant and deny
system access to specific hosts.
Reference:
UNIX STIG: 6.6
4. GEN006640 – Virus Protection Software
Check for the existence of the Mcafee command line scan tool to be executed weekly in the cron file. The
Mcafee command line scanner is available for most Unix/Linux operating systems. Additional tools specific for
each operating system are also available and will have to be manually reviewed if they are installed. In addition,
the defintions file should not be older than 14 days. Anti-Virus software can be obtained from https://
www.cert.mil.
Check if uvscan scheduled to run:
Solaris
# grep uvscan /var/spool/cron/crontabs/*
HP-UX
# grep uvscan /var/spool/cron/crontabs/*
AIX
# grep uvscan /var/spool/cron/crontabs/*
IRIX
# grep uvscan /var/spool/cron/crontabs/*
Linux
# grep uvscan /var/spool/cron/*
# grep uvscan /etc/cron.d/*
# grep uvscan /etc/cron.daily/*
# grep uvscan /etc/cron.hourly/*
# grep uvscan /etc/cron.monthly/*
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 258
# grep uvscan /etc/cron.weekly/*
Perform the following to ensure the virus definition signature files are not older than 14 days.
# ls –la clean.dat names.dat scan.dat
If a virus scanner is not being run weekly or the virus definitions are older than 14 days, then this is a finding.
PDI:
GEN006640V001276 Category I
5
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECVP-1
PDI Description:
An approved DOD virus scan program is not used and/or
updated.
Reference:
CTO 06-12
6. SUN SOLARIS
1. Removable Media
1. SOL00020 – /etc/rmmount.conf Configuration
# grep mount /etc/rmmount.conf
Confirm the nosuid option is configured, for example:
mount * hsgs udgs ufs –o nosuid
If the nosuid option is not configured in the /etc/rmmount.conf file, then this is a finding and must be
justified and documented with the IAO.
PDI:
SOL00020V001203 Category II
1
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 259
IA Controls:
PDI Description:
The nosuid option is not configured in the /etc/rmmount.conf file.
Reference:
UNIX STIG: 8.1
2. The audit_user File
1. SOL00040 – audit_user User Auditing Levels
Perform:
#
more /etc/security/audit_user
If /etc/security/audit_user has entries other than root, ensure the users defined are audited with the
same flags as all users as defined in /etc/security/audit_control file.
PDI:
SOL00040V000435 Category:II
3
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G677
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The audit_user file has a different auditing level for specific users.
Reference:
UNIX STIG: 8.2
2. SOL00060 – audit_user Ownership
Check /etc/security/audit_user ownership:
# ls –lL /etc/security/audit_user
If / etc/security/audit_user is not owned by root, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 260
SOL00060V000435 Category:II
2
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G678
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECTP-1
PDI Description:
The audit_user file is not owned by root.
Reference:
UNIX STIG: 8.2
3. SOL00080 – audit_user Group Ownership
Check /etc/security/audit_user group ownership:
# ls –lL /etc/security/audit_user
If / etc/security/audit_user is not group owned by root, sys, or bin, then this is a finding.
PDI:
SOL00080V000435 Category:II
1
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G679
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECTP-1
PDI Description:
The audit_user file is not group owned by root, sys, or bin.
Reference:
UNIX STIG: 8.2
4. SOL00100 – audit_user Permissions
Check /etc/security/audit_user permissions:
# ls –lL /etc/security/audit_user
If / etc/security/audit_user is more permissive than 640, then this is a finding.
PDI:
SOL00100V000424 Category:II
5
http://s3.amazonaws.com/0706/819143.html
Status Code: AUTO
Previously:
G680
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 261
MAC/Confidentiality Levels:
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECTP-1
PDI Description:
The audit_user file is more permissive than 640.
Reference:
UNIX STIG: 8.2
3. Automated Security Enhancement Tool (ASET)
1. SOL00120 – Aset Master Files Location
Verify that ASET is being used by:
#
crontab –l |grep aset
If there is an out put, then check to make sure that the files in question are in the /usr/aset/masters
directory by performing:
#
ls –l /usr/aset/masters
The following files should be in the listing: tune.high , tune.low , tune.med , and uid_aliases . If
the all of the files are not in the directory listing, then this is a finding.
PDI:
SOL00120V000431 Category:II
3
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G681
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
Aset master files are not located in the /usr/aset/masters directory.
Reference:
UNIX STIG: 8.3
4. The uid_aliases File
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 262
1. SOL00140 – /usr/asset/masters/uid_aliases Content
# more /usr/aset/masters/uid_aliases
If fhe /usr/aset/masters/uid_aliases file is not empty or all contents are not commented out, then
this is a finding.
PDI:
SOL00140V000431 Category:II
2
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G682
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The /usr/aset/masters/uid_aliases file is not empty.
Reference:
UNIX STIG: 8.3.1
5. The asetenv File
1. SOL00160 – ASET Used on a Firewall
Peform the following to determine if ASET is being used:
#
crontab –l |grep aset
An a returned entry would indicate ASET is being utilized. Determine if ASET is configured to check firewall
settings by:
#
grep TASKS /usr/aset/asetenv | grep firewall
If an entry is not returned, then this is a finding.
PDI:
SOL00160V000430 Category:II
9
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G685
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 263
IA Controls:
DCSW-1
PDI Description:
ASET is used on a firewall system and the firewall parameters are
not in
/usr/aset/asetenv.
Reference:
UNIX STIG: 8.3.2
2. SOL00180 – ASET Environment Variables
Determine is ASET is being used by:
#
crontab –l | grep aset
Check the configuration of ASET by:
#
more /usr/aset/asetenv
If there are any changes below the following two lines that are not comments, this is a finding:
# Don't change from here on down ...
#
# there shouldn't be any reason to.
#
In addition, if any of the following lines do not match, this is a finding.
TASKS="firewall env sysconf usrgrp tune cklist eeprom"
CKLISTPATH_LOW=${ASETDIR}/tasks:#${ASETDIR} \
/util:${ASETDIR}/masters:/etc
CKLISTPATH_MED=${CKLISTPATH_LOW};/usr/bin:/usr/ucb
CKLISTPATH_HIGH=${CKLISTPATH_MED}:/usr/lib:/sbin: \
/usr/sbin:/usr/ucblib
YPCHECK=false
PERIODIC_SCHEDULE="0 0 * * *"
UID_ALIASES=${ASETDIR}/masters/uid_aliases
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 264
SOL00180V000095 Category:II
3
MAC/Confidentiality Levels:
Status Code: PART
Previously:
SO05
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
ASET environment variables in the asetenv file are not correct.
Reference:
UNIX STIG: 8.3.2
6. Running ASET
1. SOL00200 – NIS+ and YPCHECK
Perform the following to determine if ASET is configured to check NIS+:
#
grep YPCHECK /usr/aset/asetenv
If NIS+ is running and the YPCHECK variable is set to false, then this is a finding.
PDI:
SOL00200V000095 Category:II
4
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
SO06
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
NIS+ is configured on the Solaris system and YPCHECK is not set
to true.
Reference:
UNIX STIG: 8.3.3
2. SOL00220 – /usr/aset/userlist Content
Perform the following to determine if ASET is scheduled to run:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 265
#
crontab –l | grep aset
The default user list is /usr/aset/userlist. If the –u option is specified in the crontab entry, then the
userlist file is the argument supplied to the –u option. Perform:
#
more /usr/aset/userlist
If the file does not exist or if the file does not contain a list of the system usernames, then this is a finding.
PDI:
SOL00220V000095 Category:II
5
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
SO07
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The /usr/aset/userlist file does not contain a list of all system users.
Reference:
UNIX STIG: 8.3.3
3. SOL00240 – /usr/asset/userlist Ownership
# ls –lL /usr/aset/userlist
If /usr/asset/userlist is not owned by root, then this is a finding.
PDI:
SOL00240V000095 Category:II
6
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
SO08
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The /usr/aset/userlist file is not owned by root.
Reference:
UNIX STIG: 8.3.3
4. SOL00260 – /usr/asset/userlist Permissions
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 266
# ls –lL /usr/aset/userlist
If /usr/aset/userlist is more permissive than 600, then this is a finding.
PDI:
SOL00260V000095 Category:II
7
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
SO09
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, IAAC-1, ECPA-1
PDI Description:
The /usr/aset/userlist file is more permissive than 600.
Reference:
UNIX STIG: 8.3.3
7. Electrically Erasable Programmable Read-only Memory (EEPROM)
1. SOL00300 – EEPROM security-mode Parameter
# eeprom | grep security-mode
If the EEPROM security-more parameter is not set to full or command , then this is a finding.
PDI:
SOL00300V000095 Category:II
8
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
SO10
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
PDI Description:
The EEPROM security-mode parameter is not set to full or
command mode.
Reference:
UNIX STIG: 8.4
8. Sun Answerbook2
1. SOL00360 – Sun Answerbook2 Script Access
Applicable to Solaris 2.5.1 through Solaris 5.8.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 267
# find / -name dhttpwd
If the Answerbook binary is found, p erform procedures in Appendix F, Patch Control, to check for the following
patches:
Solaris 5.5.1
110532-01
Solaris 5.5.1_x86
110538-01
Solaris 5.6
110532-01
Solaris 5.6_x86
110538-01
Solaris 5.7
110532-01
Solaris 5.7_x86
110538-01
Solaris 5.8
110532-01
Solaris 5.8_x86
110538-01
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
SOL00360V000471 Category III
0
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
V9756
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DSCQ-1
PDI Description:
A version of Sun AnswerBook2 allows unauthorized scripts
access.
Reference:
UNIX STIG: 8.5.1
2. SOL00380 – Sun Answerbook2 dwhttpd Format String
Applicable to Solaris 2.5.1 through Solaris 5.8.
# find / -name dhttpwd
If the Answerbook binary is found, p erform procedures in Appendix F, Patch Control, to check for the following
patches:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 268
Solaris 5.5.1
110531-01
Solaris 5.5.1_x86
110537-01
Solaris 5.6
110531-01
Solaris 5.6_x86
110537-01
Solaris 5.7
110531-01
Solaris 5.7_x86
110537-01
Solaris 5.8
110531-01
Solaris 5.8_x86
110537-01
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
SOL00380V000471 Category II
1
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
V9758
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1
PDI Description:
A version of Sun AnswerBook2 was found vulnerable to the
dwhttpd format string vulnerability.
Reference:
UNIX STIG: 8.5.2
9. NFS Server Logging
1. SOL00400 – NFS Server Logging
To enable NFS server logging the ‘log’ option must be applied to all exported files systems in the /etc/dfs/
dfstab. Perform the following to verify NFS is enabled:
#
share
The preceding command will display all exported filesystems. Each line should contain a ‘log’ entry to indicate
logging is enabled. If the ‘log’ entry is not present then this is a finding. If the share command does not return
anything, then this is not an NFS server and this is considered Not Applicable.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 269
SOL00400V000430 Category:II
0
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G696
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCHW-1
PDI Description:
An NFS server does not have logging implemented.
Reference:
UNIX STIG: 8.6
10. Extended File Attributes
1. SOL00420 – Hidden Extended File Attributes
This is applicable to Solaris 9, and later.
# find / -xattr –print -exec runat {} ls –al \;
If hidden extended file attributes exist, then this is a finding.
PDI:
SOL00420V001203 Category II
2
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
Hidden extended file attributes exist.
Reference:
UNIX STIG: 8.7
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 270
11. Root Default Group
1. SOL00440 – Group Account with gid of 0
This is applicable to Solaris 10, and later.
# more /etc/passwd
# more /etc/group
Confirm the only account with a group id of 0 is root.
If the root account is not the only account with gid of 0, then this is a finding.
PDI:
SOL00440V001203 Category I
3
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-2
PDI Description:
The root account is not the only account with gid of 0.
Reference:
UNIX STIG: 8.7
7. HEWLETT PACKARD UNIX (HP-UX)
1. Trusted Mode
1. HPUX0020 – Operating in Trusted Mode
To check if the system is in Trusted Mode the following file structure should exist:
# ls –la /tcb/files/auth/r/root
If the file does not exist, this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 271
HPUX0020V000096 Category II
0
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
HP02
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
System is not operating in trusted mode.
Reference:
UNIX STIG: 9.1
2. Trusted System Auditing
1. HPUX0040 – AUDMON_ARGS Flag Configuration
Determine if the following flags are set for auditing:
# tail /etc/rc.config.d/auditing
The AUDOMON_ARGS flag should be the last line in the file. Look at the arguments and compare them to -p
20, -t 1, -w 90. If any of these differ, this a finding.
PDI:
HPUX0040V000429 Category II
0
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
HP14
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECAT-1, ECAR-1
PDI Description:
HP-UX AUDOMON_ARGS flag is not set to STIG requirements:
-p 20, -t 1, -w 90.
Reference:
UNIX STIG: 9.1.1
3. The /etc/securetty File
1. HPUX0060 – /etc/securetty Ownership
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 272
# ls –lL /etc/securetty
If /etc/securetty is not owned root, then this is a finding.
PDI:
HPUX0060V000096 Category II
6
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
HP08
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The /etc/securetty file is not owned by root.
Reference:
UNIX STIG: 9.1.1
2. HPUX0080 – / etc/securetty Group Owner
# ls –lL /etc/securetty
If /etc/securetty is not grup owned by root, sys, or bin, then this is a finding.
PDI:
HPUX0080V000096 Category II
5
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
HP07
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The /etc/securetty file is not group owned by root, sys, or bin.
Reference:
UNIX STIG: 9.1.1
3. HPUX0100 – /etc/securetty Permissions
# ls –lL /etc/securetty
If /etc/securetty is more permissive than 640, then this is a finding.
PDI:
HPUX0100V000096 Category II
7
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
HP09
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 273
IA Controls:
ECLP-1
PDI Description:
The /etc/securetty file is more permissive than 640.
Reference:
UNIX STIG: 9.1.1
8. IBM ADVANCED INTERACTIVE EXECUTIVE (AIX)
1. Security Structure
1. AIX00020 – TCB Software
Perform:
# /bin/tcbck
If TCB is not installed, the output will show an error code of 3001-101 and/or a text message that indicates TCB
is not installed. This will result in a finding.
PDI:
AIX00020V000096 Category II
9
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
AIX02
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
TCB software is not implemented.
Reference:
UNIX STIG: 10.0
2. Network Security
1. AIX00040 – securetcpip Command
The securetcpip command is in /etc . If it is not there, this is a finding.
Perform:
# more /etc/security/config
If the stanza:
tcpip:
netrc = ftp, rexec
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 274
is not there, then this is a finding. The stanza indicates the securetcpip command, which disables all the
unsafe tcpip commands, (e.g., rsh, rlogin, tftp) has been executed.
PDI:
AIX00040
V0004284
Category II
:
Status Code: AUTO
Previously:
AIX07
MAC/Confidentiality Levels:MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSW-1
PDI Description:
The securetcpip command has not been used.
Reference:
UNIX STIG: 10.2
3. System Commands
1. AIX00060 – System Baseline for Files with TCB Bit Set
Perform the following command with no parameters to ensure the system is in trusted mode:
#
/bin/tcbck
If TCB is not installed, the output will show an error code of 3001-101 and/or a text message that indicates TCB
is not installed. If the output from the command indicates that it is not in trusted mode, mark this item Not
Reviewed. Otherwise, check the root crontab to verify tcbck is executed weekly. If it is not in the crontab,
ask the SA if the check is run manually and to see the results of the check.
PDI:
AIX00060
V0004287
Category II
:
Status Code: PART
Previously:
AIX10
MAC/Confidentiality Levels:MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCPR-1, VIVM-1
PDI Description:
A baseline of AIX files with the TCB bit set is not checked weekly.
Reference:
UNIX STIG: 10.3
4. Authentication
1. AIX00080 – SYSTEM Attribute
Examine the /etc/security/user file:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 275
#
grep SYSTEM /etc/security/user
If the line contains “SYSTEM=NONE” then this is a finding.
PDI:
AIX00080V001203 Category I
5
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
PDI Description:
The SYSTEM attribute is set to NONE.
Reference:
UNIX STIG: 10.4
9. SILICON GRAPHICS (SGI) IRIX
10. Xfsmd
1. IRIX0020 – The xmfsmd Service is Enabled
Check for the following line by performing:
#
more /etc/inetd.conf
sgi_xfsmd/1 stream rpc/tcp wait
root
/usr/etc/xfsmd
xfsmd
If this line is uncommented then this is a finding.
PDI:
IRIX0020
V0004705
Category I
:
Status Code: AUTO
Previously:
V9402
MAC/Confidentiality Levels:MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 276
IA Controls:
DSCQ-1
PDI Description:
The xfsmd service is enabled.
Reference:
UNIX STIG: 11.1
11. LINUX
1. System BIOS Configuration
1. LNX00040 – Disable Boot From Removable Media
If the CM OS is not configured to disable the capability to boot from removable media (e.g., diskette), then this is
a finding.
PDI:
LNX00040V000101 Category:I
3
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
L007
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECSC-1
PDI Description:
The CMOS is not configured to disable the capability to boot from
removable media (e.g., diskette).
Reference:
UNIX STIG: 12.2
2. Restricting the Boot Process
1. LNX00060 – Password Configuration Table Configuration
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 277
On x86 systems enter the system BIOS and confirm that a supervisor password is enabled. Some systems will
have only one password setting, while others may have both user and supervisor settings. On those with two
settings, ensure the supervisor password is enabled and set. If the system cannot be rebooted to confirm the
settings, ask the system administrator if a BIOS password is enabled. If it is not, then this is a finding.
PDI:
LNX00060V000424 Category II
6
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
L064
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCPR-1
PDI Description:
The Password Configuration Table has the Supervisor Password
set to OFF or the User Password set to ON.
Reference:
UNIX STIG: 12.3
3. Boot Loaders
1. LNX00080 – Boot Diskette
Confirm /etc/lilo.conf or /boot/grub/grub.conf exist, if neither exists, ask the SA if they are
using a boot diskette as the boot loader.
If a boot diskette is implemented as the boot loader, then this is a finding.
PDI:
LNX00080V000424 Category I
7
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L066
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCB-1, DCCB-2
PDI Description:
A boot diskette is implemented as the boot loader.
Reference:
UNIX STIG: 12.4
2. LNX00100 – Default Boot Loader
Check for the presence of boot loader configuration files by:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 278
# test –f /etc/grub.conf
# echo $?
# test –f /etc/lilo.conf
# echo $?
If either of the echo statements return 1, the preceding file is not on the system. Grub is the preferred boot loader
for the system. If the LILO is being utilized, check for the presence of /etc/lilo.conf.crc which should
contain a hashed password. If it does not contain a hashed password or another third party boot loader is utilized
then this is a finding.
PDI:
LNX00100V000424 Category I
8
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L068
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCB-1, DCCB-2
PDI Description:
The default boot loader does not support journeling and the
password cannot be encrypted and the host is not located in a
controlled access area accessible only by SAs and justified and
documented with the IAO.
Reference:
UNIX STIG: 12.4
3. LNX00120 – /boot Partition
Ask the SA if the Linux /boot partition resides on removable media (e.g., cdrom, diskette). If so, ask the SA to
verify if it is stored securely under the direction of the security officer and is only used in emergencies. This is a
finding if the media is not stored in a secure location.
PDI:
LNX00120V000425 Category:I
5
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
L084
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
PESS-1
PDI Description:
The /boot partition is on removable media and is not stored in a
secure container.
Reference:
UNIX STIG: 12.4
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 279
4. Password Protecting the GRUB Console Boot Loader
1. LNX00140 – GRUB Boot Loader Encrypted Password
Perform the following to /etc/grub.conf or /boot/grub/menu.lst :
# more /boot/grub/menu.lst
timeout=10
password --md5 <password-hash>
This line should be just below the line that begins with timeout. Please note that <password-hash> will be
replaced by the actual md5 encrypted password. If the password line is not in either of the files, this is a finding.
PDI:
LNX00140V000424 Category I
9
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L072
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCB-1, DCCB-2
PDI Description:
The GRUB Boot Loader does not use an MD5 encrypted
password.
Reference:
UNIX STIG: 12.4.1.1
2. LNX00160 – grub.conf Permissions
Check /etc/grub.conf permissions:
# ls –lL /etc/grub.conf
If /etc/grub.conf is more permissive than 600, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 280
LNX00160V000425 Category:II
0
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L074
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The grub.conf is more permissive than 600.
Reference:
UNIX STIG: 12.4.1.2
5. Password Protecting the LILO Boot Loader
1. LNX00180 – LILO Global Password
Check for the password to precede the first image stanza in /etc/lilo.conf :
#
more /etc/lilo.conf
password=””
image=/boot/vmlinuz-2.4.20-6smp
If a password is not found, then this is a finding.
PDI:
LNX00180V000425 Category I
2
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L078
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCB-1, DCCB-2, DCCS-1, DCCS-2
PDI Description:
LILO does not have a global password in the /etc/lilo.conf file.
Reference:
UNIX STIG: 12.4.1.2
2. LNX00200 – LILO Boot Loader Encrypted Password
On newer linux systems, the lilo password can be hashed in a separate file. To determine if the lilo password is
encrypted perform the following:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 281
# grep password /etc/lilo.conf
If the returned line contains password=”” , then perform the following:
# more /etc/lilo.conf.crc
If the file does not exist, this is a finding.
PDI:
LNX00200V001203 Category I
6
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCB-1, DCCB-2
PDI Description:
The LILO Boot Loader password is not encrypted.
Reference:
UNIX STIG: 12.4.1.2
3. LNX00220 – /etc/lilo.conf Permissions
Check /etc/lilo.conf permissions:
# ls –lL /etc/lilo.conf
If /etc/lilo.conf is more permissive than 600, then this is a finding.
PDI:
LNX00220V000425 Category I
3
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L080
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The /etc/lilo.conf file is more permissive than 600.
Reference:
UNIX STIG: 12.4.1.2
6. Filesystems
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 282
1. LNX00240 – Journaling
Perform the following to check for journaling:
# more /etc/fstab
Valid filesystem types that include journaling are ext3, reiserfs, jfs and xfs.
Note: the CD, floppy drives, proc, and, swap entries do not support ext3 .
PDI:
LNX00240V000101 Category II
5
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
L017
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
Journaling is not configured on the primary filesystem partitions
or journaling is not supported and not justified and documented
with the IAO.
Reference:
UNIX STIG: 12.5
7. Red Hat Kickstart and SuSE AutoYaST
1. LNX00260 – Kickstart or AutoYaST
On SuSE systems tftp must be running for AutoYaST to work properly. Check for tftp by:
#
chkconfig –-list tftp
If tftp is found, as the SA if the server is configured for AutoYaST.
Redhat systems utilize nfs and bootp to assist Kickstart. Perform:
# more /etc/exports
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 283
# more /etc/bootptab
and ask the SA if any of the exported file systems contain Kickstart images to be installed on a client.
PDI:
LNX00260V000425 Category:I
6
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
L088
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECSD-1, ECSD-2
PDI Description:
Kickstart or AutoYaST are used outside an isolated development
LAN.
Reference:
UNIX STIG: 12.6
8. Dual Boot
1. LNX00280 – Capable of Dual Boot
Review the applicable boot loader configuration file to ensure it is capable of booting only one operating system.
For the grub boot loader, /etc/grub.conf should be reviewed. For the lilo boot loader, /etc/
lilo.conf should be reviewed. Locations for these file may differ on older versions of linux.
PDI:
LNX00280V000101 Category II
6
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
L022
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCPR-1
PDI Description:
A Linux system capable of booting multiple operating systems is
not justified and documented with the IAO.
Reference:
UNIX STIG: 12.7
9. Ugidd RPC Daemon
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 284
1. LNX00300 – The rpc.ugidd Daemon is Enabled
To check for the rpc.ugidd daemon perform:
#
chkconfig –list rpc.ugidd
Or
# ps –ef | grep –i ugidd
If the daemon is running or installed this is a finding.
PDI:
LNX00300V000426 Category:II
2
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L128
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCPR-1
PDI Description:
The rpc.ugidd daemon is enabled.
Reference:
UNIX STIG: 12.8
10. Default Accounts
1. LNX00320 – Special Privileged Accounts
Perform the following to check for unnecessary privileged accounts:
# more /etc/passwd
Some examples of unnecessary privileged accounts include halt, shutdown, reboot and who.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 285
LNX00320V000426 Category I
8
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L140
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAAC-1, ECPA-1
PDI Description:
Special privilege accounts, such as shutdown and halt, have not
been deleted.
Reference:
UNIX STIG: 12.9
2. LNX00340 – Unnecessary Accounts
Perform the following to check for unnecessary user accounts:
# more /etc/passwd
Some examples of unnecessary accounts includes games, news, gopher, ftp.
PDI:
LNX00340V000426 Category:II
9
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L142
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
IAAC-1
PDI Description:
Unnecessary accounts (e.g., games, news) and associated software
have not been deleted.
Reference:
UNIX STIG: 12.9
11. X Windows
1. LNX00360 – X Server Options Enabled
X servers get started several ways, such as xdm, gdm or xinit . Perform:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
#
Page 286
ps –ef |grep X
Output for example:
/usr/X11R6/bin/X –nolisten –ctp –br vt7 –auth /var/lib/xdm/authdir/
authfiles/A:0
Check the Xservers file to ensure the following options are enabled:
-audit, -auth .
Xserver files can found in:
/etc/X11/xdm/Xservers
/etc/opt/kde3/share/config/kdm/Xservers
/etc/X11/gdm/Xservers
PDI:
LNX00360V000102 Category:II
1
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L032
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCPR-1
PDI Description:
The X server does not have the correct options enabled.
Reference:
UNIX STIG: 12.10
2. LNX00380 – X Server Options Not Enabled
X servers get started several ways, such as xdm, gdm or xinit . Perform:
#
ps –ef |grep X
Output for example:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 287
/usr/X11R6/bin/X –nolisten –ctp –br vt7 –auth /var/lib/xdm/authdir/
authfiles/A:0
The above example show xdm is controlling the Xserver.
Check the Xservers file to ensure the following options are not enabled:
-ac, -core, and -nolock .
Xserver files can found in:
/etc/X11/xdm/Xservers
/etc/opt/kde3/share/config/kdm/Xservers
/etc/X11/gdm/Xservers
PDI:
LNX00380V000102 Category:II
2
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L034
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCPR-1
PDI Description:
The X server has one of the following options enabled: -ac, -core
(except for debugging purposes), or -nolock.
Reference:
UNIX STIG: 12.10
12. Console Access
1. LNX00400 – Access File Ownership
Chec k file applicable to the system, login.access or access.conf.
Check /etc/login.access ownership:
# ls –lL /etc/login.access
Check /etc/ security/access.conf ownership:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 288
# ls –lL /etc/security/access.conf
If /etc/login.access or /etc/security/access.conf is not owned by root, then this is a finding.
PDI:
LNX00400V000102 Category:II
5
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L044
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The /etc/login.access or /etc/security/access.conf file is not owned
by root.
Reference:
UNIX STIG: 12.11
2. LNX00420 – Access File Group Ownership
Check file applicable to the system , login.access or access.conf.
.
Check /etc/login.access ownership:
# ls –lL /etc/login.access
Check /etc/login.access ownership:
# ls –lL /etc/security/access.conf
If /etc/login.access or /etc/security/access.conf is not group owned by root, then this is a
finding.
PDI:
LNX00420V000105 Category:II
4
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L045
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The /etc/login.access or /etc/security/access.conf file is not group
owned by root.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 289
Reference:
UNIX STIG: 12.11
3. LNX00440 – Access File Permissions
Check file applicable to your system , login.access or access.conf.
.
Check /etc/login.access ownership:
# ls –lL /etc/login.access
Check /etc/login.access ownership:
# ls –lL /etc/security/access.conf
If /etc/login.access or /etc/security/access.conf is more permissive than 640, then this is a
finding.
PDI:
LNX00440V000105 Category:II
5
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L046
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The /etc/login.access or /etc/security/access.conf file is more
permissive than 640.
Reference:
UNIX STIG: 12.11
13. Kernel Configuration File
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 290
1. LNX00480 – /etc/sysctl.conf Ownership
Check /etc/sysctl.conf ownership:
# ls –lL /etc/sysctl.conf
or
# ls –lL /etc/sysconfig/sysctl
If /etc/sysctl.conf is not owned by root, then this is a finding.
PDI:
LNX00480V000433 Category:II
4
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L204
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The /etc/sysctl.conf file is not owned by root.
Reference:
UNIX STIG: 12.12
2. LNX00500 – /etc/sysctl.conf Group Ownership
Check /etc/sysctl.conf group ownership:
# ls –lL /etc/sysctl.conf
If /etc/sysctl.conf is not group owned by root, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 291
LNX00500V000433 Category:II
5
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L206
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The /etc/sysctl.conf file is not group owned by root.
Reference:
UNIX STIG: 12.12
3. LNX00520 – / etc/sysctl.conf Permissions
Check /etc/sysctl.conf permissions:
# ls –lL /etc/sysctl.conf
If /etc/sysctl.conf is more permissive than 600, then this is a finding.
PDI:
LNX00520V000433 Category:II
6
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L208
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1, ECCD-1, ECCD-2
PDI Description:
The /etc/sysctl.conf file is more permissive than 600.
Reference:
UNIX STIG: 12.12
14. NFS Server
1. LNX00540 – The insecure Option
Determine if an NFS server is running on the system by:
#
ps –ef |grep nfsd
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 292
If an NFS server is running, confirm that it is not configured with the insecure option by:
#
exportfs –v
The example below would be a finding:
/misc/export
PDI:
speedy.redhat.com(rw,insecure)
LNX00540V001203 Category I
7
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCPR-1
PDI Description:
The insecure option is set.
Reference:
UNIX STIG: 12.13
2. LNX00560 – The insecure_locks Option
Determine if an NFS server is running on the system by:
#
ps –ef |grep nfsd
If an NFS server is running, confirm that it is not configured with the insecure_locks option by:
#
exportfs –v
The example below would be a finding:
/misc/export
PDI:
speedy.redhat.com(rw,insecure_locks)
LNX00560V000433 Category I
9
:
http://s3.amazonaws.com/0706/819143.html
Status Code: AUTO
Previously:
L214
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 293
MAC/Confidentiality Levels:
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCPR-1
PDI Description:
The insecure_locks option is set.
Reference:
UNIX STIG: 12.13
15. The /etc/inittab File
1. LNX00580 – Ctrl-Alt-Delete Sequence
Verify that Linux systems have disabled the <CTRL><ALT><DELETE> key sequence by performing:
# grep ctrlaltdel /etc/inittab
If the line returned is not commented out then this is a finding.
PDI:
LNX00580V000434 Category:I
2
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
L222
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCPR-1
PDI Description:
The Ctrl-Alt-Delete sequence is not disabled and the system is not
located in a controlled access area accessible only by SAs.
Reference:
UNIX STIG: 12.14
16. Administrative Controls
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 294
1. LNX00600 – PAM Configuration
Ensure the pam_console.so module is not configured in any files in /etc/pam.d by:
#
cd /etc/pam.d
#
grep pam_console.so *
Or
#
ls –la /etc/security/console.perms
If either the pam_console.so entry or the file /etc/security/console.perms is found then this is a
finding.
PDI:
LNX00600V000434 Category:II
6
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
L230
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCCS-1, DCCS-2
PDI Description:
PAM grants sole access to admin privileges to the first user who
logs into the console.
Reference:
UNIX STIG: 12.16
17. The /etc/securetty File
1. LNX00620 – /etc/securetty Group Ownership
Check /etc/securetty group ownership:
# ls –lL /etc/securetty
If /etc/securetty is not group owned by root, sys, or bin, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 295
LNX00620V001203 Category II
8
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The /etc/securetty file is not group owned by root, sys, or bin.
Reference:
UNIX STIG: 12.17
2. LNX00640 – /etc/securetty Ownership
Check /etc/securetty ownership:
# ls –lL /etc/securetty
If /etc/securetty is not owned by root, then this is a finding.
PDI:
LNX00640V001203 Category II
9
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECLP-1
PDI Description:
The /etc/securetty file is not owned by root.
Reference:
UNIX STIG: 12.17
3. LNX00660 – /etc/securetty Permissions
Check /etc/securetty permissions:
# ls –lL /etc/securetty
If /etc/securetty is more permissive than 640, then this is a finding.
PDI:
LNX00660V001204 Category II
0
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 296
IA Controls:
ECLP-1
PDI Description:
The /etc/securetty file is more permissive than 640.
Reference:
UNIX STIG: 12.17
18. RealPlayer
1. LNX00680 – RealPlayer Version
Check the Real Player version:
#
rpm –q RealPlayer
If the version returned is 8, then remove RealPlayer by:
#
PDI:
rpm –e RealPlayer
LNX00680V001204 Category II
1
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1
PDI Description:
A vulnerable RealPlayer version is installed.
Reference:
UNIX STIG: 12.19
12. Information Assurance Vulnerability Management (IAVM)
1. IAVA0005 – 2001-A-0011 Format String Vulnerability in CDE ToolTalk
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 297
Vulnerable Systems:
HP HP-UX 10.10
HP HP-UX 10.20
HP HP-UX 10.24
HP HP-UX 11.00
HP HP-UX 11.04
HP HP-UX 11.11
IBM AIX 4.3
IBM AIX 5.1
SGI IRIX 5.2-6.4
Compaq Tru64 DIGITAL UNIX v4.0f
Compaq Tru64 DIGITAL UNIX v4.0g
Compaq Tru64 DIGITAL UNIX v5.0a
Compaq Tru64 DIGITAL UNIX v5.1
Compaq Tru64 DIGITAL UNIX v5.1a
Sun Solaris 1.1-1.2
Sun Solaris 2.0-2.7
Sun Solaris 7
Sun Solaris 8
Open Group
Caldera (SCO)
Xi Graphics
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check if the following patches or package versions have
been loaded:
Solaris
2.5.1
104489-15
Solaris
2.5.1_x86
105496-12
Solaris
2.6
Solaris
2.6x86
Solaris
2.7
Solaris
2.7x86
Solaris
2.8
Solaris
2.8x86
105802-19
105803-21
107893-21
107894-20
110286-14
110287-14
HP-UX
10.10
PHSS_26488
HP-UX
10.20
PHSS_29201
HP-UX
10.24
PHSS_29201
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 298
HP-UX
10.30
PHSS_16151
HP-UX
11.00
PHSS_32539
HP-UX
11.11
PHSS_33325
IRIX
6.5 and above
SG0004416
AIX
4.3
IY24387
AIX
5.1
IY23846
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0005V000099 Category I
8
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G345
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A vulnerable version of ToolTalk is running.
Reference:
IAVA 2001-A-0011
2. IAVA0010 – 1999-0002 TCP Wrappers Trojan Vulnerability
Vulnerable Systems:
Any system with a recent installation of TCP Wrappers
(primarily UNIX systems)
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 299
Compliance Checking:
Look in the TCP Wrappers source code for the following added line:
#
grep "/bin/csh" tcpd.c
Or
Review the binary code for the following signature
#
strings tcpd |grep csh
Any output from the above commands is considered a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0010V000100 Category I
2
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G357
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A TCP_WRAPPERS Trojan exists on the system.
Reference:
IAVA 1999-0002
3. IAVA0015 – 98-06 Qpopper Vulnerability
Vulnerable Systems:
Any OS running a POP server based on QUALCOMM's Qpopper
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 300
Compliance Checking:
To determine if a system is vulnerable, first telnet to port 110 on
that host. If it is running a POP server, the banner will show the
version. For example:
# telnet yourmailhost.your.domain.com 110
Trying 123.123.123.123
Connected to mailhost
+OK QPOP (version 2.4) at yourmailhost.your.domain.com starting
In the above example, the POP server is QUALCOMM's Qpopper version 2.4, which is known to be a
vulnerable version.
IRIX
Check to see if the vulnerable subsystem is installed.
Versions 2.41 and prior of fw_BSDqpopper are vulnerable.
# versions -b fw_BSDqpopper
Name
Date
Description
I fw_BSDqpopper 07/01/97 BSD/Qualcomm POP (Post Office Protocol)
Server version 2.1.4
Upgrade to a BSDqpopper version greater than 2.1.4.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0015V000100 Category II
5
:
http://s3.amazonaws.com/0706/819143.html
Status Code: AUTO
Previously:
G361
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 301
MAC/Confidentiality Levels:
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A QUALCOMM Post Office Protocol (POP) server is vulnerable.
Reference:
IAVA 98-06
4. IAVA0020 – 1998-A-0011 General Internet Message Access Protocol
Vulnerable Systems:
All platforms running IMAP or POP servers.
Compliance Checking:
Perform the following to check if the mail servers are running:
# netstat -a | grep LISTEN | egrep \
“imap|pop|pop3|\.143|\.110”
#
An authorized user could type the
following to determine the version of IMAP:
#
telnet hostname 143
Likewise the following command can be used to check for POP-3 Servers:
#
telnet hostname 110
Use the procedures in Appendix F, Patch Control , to check if the following patches have been loaded:
Solaris Internet Mail Server
3.2
105935-09
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 302
3.2_x86
105936-09
2.0
105346-07
2.0_x86
105347-07
AIX 4.2.x
IX80446
AIX 4.3.x
IX80447
Red Hat
imap-4.1.final-1.i386.rpm
IRIX
Check to see if the vulnerable subsystem is installed.
4.1-BETA and prior of fw_imap are vulnerable.
# versions -b fw_imap
I fw_imap
07/31/98 imap-4.1.BETA U. of Washington
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0020V000100 Category II
6
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G363
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are Internet Message Protocol (IMAP) or Post Office
Protocol (POP) vulnerabilities.
Reference:
IAVA 1998-A-0011
5. IAVA0025 – 98-07 Buffer Overflow in Mail and News Clients
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 303
Vulnerable Systems:
Any OS running a vulnerable mail or news client, including
Netscape Messenger.
Compliance Checking:
Use the procedures in Appendix F, Patch Control, to determine the following:
SOLARIS
2.5.1
104178-04
SOLARIS
2.5.1_x86
104185-04
SOLARIS
2.6
SOLARIS
2.6x86
SOLARIS
2.7
SOLARIS
2.7x86
HP-UX
10.10
105338-27
105339-25
107200-16
107201-16
PHSS_26488
HP-UX
10.20
PHSS_29202
HP-UX
10.24
PHSS_28173
HP-UX
10.30
PHSS_16151
HP-UX
11.00
PHSS_32539
HP-UX
11.04
PHSS_30807
HP-UX
11.11
PHSS_33325
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0025V000100 Category II
7
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G365
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 304
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A vulnerability exists in mime-aware mail and news clients.
Reference:
IAVA 98-07
6. IAVA0030 – 2000-A-0003 Gauntlet Firewall Buffer Overflow
Vulnerable Systems:
Gauntlet for Unix versions 4.1, 4.2, 5.0, 5.5
WebShield 300 series E-ppliance
WebShield For Solaris 4.0
WebShield 100 series E-ppliance
Compliance Checking:
Ask the SA or IAO if they are running Gauntlet software, and which version. If the system is running less
than version 5.5 patch level 14 or version 6.0 patch level 4, this is a finding.
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris
cyber.patch
Remediation Guidelines:
.
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0030V000100 Category I
8
:
http://s3.amazonaws.com/0706/819143.html
Status Code: AUTO
Previously:
G371
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 305
MAC/Confidentiality Levels:
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Gauntlet Firewall for UNIX and WebShield Cyberdaemon has the
buffer overflow vulnerability.
Reference:
IAVA 2000-A-0003
7. IAVA0035 – 2001-T-0004 MySQLd Vulnerability
Vulnerable Systems:
MySQLd 3.23.32 and all previous versions
Compliance Checking:
Perform the following to determine the version:
#
mysql –V
The version should be at least 3.23.38.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0035V000106 Category II
4
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G373
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A system has a vulnerable version of MySQLD.
Reference:
IAVA 2001-T-0004
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 306
8. IAVA0040 – 2001-A-0007 iPlanet
Vulnerable Systems:
IPlanet
versions 4.1, service pack 8 and lower
Compliance Checking:
Use the following steps to determine the version number:
1. Navigate to the following directory:
server-root /bin/https/bin
2. Run the ns-httpd program with the "-v " parameter.
#
./ns-httpd –v
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0040V000106 Category:I
7
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G505
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
iPlanet WEB servers expose sensitive data via a buffer overflow.
Reference:
IAVA 2001-A-0007
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 307
9. IAVA0045 – 2001-T-0008 BSD Telnet Daemon
Vulnerable Systems:
All current versions of BSD/OS are vulnerable.
OpenLinux 2.3
FreeBSD, Inc.
HP-UX 10.20
IBM AIX
Solaris
SuSE
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris
2.6
Solaris
2.6x86
Solaris
2.7
Solaris
2.7x86
Solaris
2.8
Solaris
2.8x86
HP-UX
10.01
PHNE_24820
HP-UX
10.10
PHNE_24820
HP-UX
10.20
PHNE_24821
HP-UX
SIS 10.20
HP-UX
10.24
AIX
4.3.3
AIX
5.1
http://s3.amazonaws.com/0706/819143.html
106049-05
106050-05
107475-05
107476-05
110668-05
110669-05
PHNE_24822
PHNE_25217
IY22029
IY22021
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
IRIX
Page 308
6.5
SG0004354
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0045V000106 Category I
9
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G507
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
The telnet daemon telrcv function is vulnerable to a buffer
overflow.
Reference:
IAVA 2001-T-0008
10. IAVA0050 – 2004-B-0015 – Sun JRE Bypass Vulnerability
Vulnerable Systems:
SDK and JRE 1.4.2_05 and earlier, all 1.4.1 and 1.4.0 releases, and 1.3.1_12 and earlier
on the following platforms:
Solaris
Linux
Compliance Checking:
To determine the version of Java on a system, the following command can be run:
#
java –fullversion
Or
#
java –version
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 309
The version should be at least 1.4.2_06 or 1.3.1_13.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0050V000501 Category II
6
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
G508
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Vulnerability in Sun Java Runtime Environment Java Plug-in
JavaScript Security Restriction .
Reference:
IAVA 2004-B-0015
11. IAVA0055 – 2001-B-0002 HP OpenView and Tivoli NetView
Vulnerable Systems:
HP OpenView Network Node Manager (NNM) Version 6.1 on the following platforms:
HP -UX releases 10.20 and 11.00 (only).
Sun Microsystems SOLARIS releases 2.X
Tivoli NetView Versions 5.x and 6.x on the following platforms:
IBM AIX
Sun Microsystems SOLARIS
Compaq Tru64 Unix
Compliance Checking:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 310
Use the procedures in Appendix F, Patch Control, to check if the following patches have been loaded for
OpenView:
HP-UX 10.20
PHSS_24797
HP-UX 11.00
PHSS_24798
Solaris
PSOV_02988
To view the Tivoli Netview version:
The Tivoli Netview standard toolbar contains an About NetView(R) icon which displays the full name,
version number, and copyright information for the Tivoli NetView program. Upgrade to version 5.1.3 and 6.0.2
and apply patches from Tivoli.
Remediation Guidelines:
Upgrade to, at the least, the required software release about icon, apply the applicable patch, or remove the
binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0055V000236 Category I
6
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G509
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Vulnerability in HP OpenView and IBM Tivoli NetView.
Reference:
IAVA 2001-B-0002
12. IAVA0060 – 2004-T-0038 – Sun Remote Denial of Service
Vulnerable Systems:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 311
Sun Java System Application Server 7.0.0 2004Q2
Sun Java System Application Server 7.0.0 Platform Edition Update 4 and earlier
Sun Java System Application Server 7.0.0 Standard Edition Update 4 and earlier
Sun Java System Web Server 6.0.0
Sun Java System Web Server 6.0.0 SP1, SP2, SP3, SP4, SP5, SP6, SP7
Sun Java System Web Server 6.1.0
Sun Java System Web Server 6.1.0 SP1
Compliance Checking:
Sun Java System Web Server:
Use the following steps to determine the version number:
1. Navigate to the following directory:
server-root /bin/https/bin
2. Run the ns-httpd program with the "-v " parameter.
#
./ns-httpd –v
To determine the version of Sun Java System Application server, the following command can be run:
# <AS_INSTALL>/bin/asadmin version –verbose
(Where <AS_INSTALL> is the installation directory of the Application Server)
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
PDI:
IAVA0060V000501 Category III
7
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G510
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Remote denial of service vulnerability in Sun Java Web and
Application Servers.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 312
Reference:
IAVA 2004-T-0038
13. IAVA0065 – 2001-A-0013 SSH V1
Vulnerable Systems:
SSH1.5: 1.2.24 - 1.2.31
SSH1.5: 1.3.6 - 1.3.10
OpenSSH 1.2, 1.2.1 - 1.2.3
OpenSSH 2.1, 2.1.1, 2.2.0
SSH Communications Security SSH 1.2.23 through 1.2.31
SSH Communications Security SSH 2.x and 3.x (Version 1 fallback is enabled)
F-Secure SSH versions prior to 1.3.11-2
OSSH 1.5.7
Debian
FreeBSD
Compliance Checking:
To get the version, perform:
#
telnet localhost 22
Or
#
strings (ssh or sshd) | grep –I version
Or
# ssh –V
OpenSSH 3.4 (required by IAVA0080)
SSH Communications Security SSH
SOLARIS 9 Integrated OpenSSH
SOLARIS 9_x86 Integrated OpenSSH
3.0.1 (required by IAVA0125)
113273-11
114858-08
Remediation Guidelines:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 313
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0065V000239 Category I
1
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G513
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
SSH is vulnerable to a remote integer overflow.
Reference:
IAVA 2001-A-0013
14. IAVA0075 – 2001-A-0009 Gauntlet SMAP/SMAPD Buffer Overflow
Vulnerable Systems:
Gauntlet for Unix versions 5.x
PGP e-ppliance 300 series version 1.0
McAfee e-ppliance 100 and 120 series
Gauntlet for Unix version 6.0
PGP e-ppliance 300 series versions 1.5, 2.0
PGP e-ppliance 1000 series versions 1.5, 2.0
McAfee WebShield for Solaris v4.1
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris
HP-UX
cyber.patch
PHCO_16723 or later
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 314
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0075V000239 Category:I
2
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G515
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Gauntlet Firewall, WebShield CSMAP, and smap/smapd have a
buffer overflow vulnerability.
Reference:
IAVA 2001-A-0009
15. IAVA0080 – 2001-T-0017 OpenSSH
Vulnerable Systems:
OpenSSH versions prior to 2.1.1
OpenBSD
OpenSSH
FreeBSD
IBM
Compliance Checking:
To get the version, perform:
#
telnet localhost 22
Or
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
#
Page 315
strings (ssh or sshd) | grep –I version
Or
# ssh –V
Upgrade to OpenSSH 3.0.2 or later.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0080V000239 Category I
3
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G517
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
The OpenSSH UseLogin feature has Multiple Vulnerabilities.
Reference:
IAVA 2001-T-0017
16. IAVA0085 – 2005-A-0014 Oracle E-Business Suite Vulnerabilities
Vulnerable Systems:
Oracle E-Business Suite 11.0.0
Oracle E-Business Suite 11i 11.5.0
Oracle E-Business Suite 11i 11.5.0 .10
Oracle E-Business Suite 11i 11.5.1
Oracle E-Business Suite 11i 11.5.2
Oracle E-Business Suite 11i 11.5.3
Oracle E-Business Suite 11i 11.5.4
Oracle E-Business Suite 11i 11.5.5
Oracle E-Business Suite 11i 11.5.6
Oracle E-Business Suite 11i 11.5.7
Oracle E-Business Suite 11i 11.5.8
Oracle E-Business Suite 11i 11.5.9
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 316
Compliance Checking:
Check for compliance by using the Oracle Installer, the GUI interface for installation. The patches listed are
spot checks for multiple-patch requirements based on version and platform. Please note whether each check is
for one of a group or requires two or more specific patches to complete the spot check.
Switch user to an account used for Oracle installations. This will ensure the environment variables are set
correctly.
Start the Oracle Installer with the command:
# $ORACLE_HOME/bin/runInstaller
When the Welcome screen displays, click on the Installed Products button at the bottom of the screen. Expand
each Oracle Home. If Oracle Collaboration suite is listed, then expand it view any installed patches.
Please ensure one of the below mentioned patches is installed;
4135540
4193286
4193293
4193299
4193301
4193307
4193312
4201702
4217570
4266635
4312525
Note: Repeat for each Oracle installation.
Remediation Guidelines:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 317
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0085V000701 Category I
7
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
G518
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are multiple vulnerabilities in Oracle E-Business and
Application Suite.
Reference:
IAVA 2005-A-0014
17. IAVA0090 – 2002-A-0001 CDE Buffer Overflow
Vulnerable Systems:
All Unix operating systems running CDE.
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris
2.5.1
108363-02
Solaris
2.5.1_x86
108364-02
Solaris
2.6
105669-11
Solaris
2.6_x86
Solaris
2.7
Solaris
2.7_x86
Solaris
2.8
Solaris
2.8_x86
105670-10
106934-04
106935-04
108949-07
108950-07
HP-UX 10.10
PHSS_25785
HP-UX 10.20
PHSS_25786
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
HP-UX 10.24
HP-UX 11.0
Page 318
PHSS_26029
PHSS_25787
HP-UX 11.04
PHSS_26030
HP-UX 11.11
PHSS_25788
IRIX 5.3
Patch will not be produced
IRIX 6.2 – 6.5.2
IRIX 6.5.3.1.1
SG0004416
SG0004416
AIX 4.3
IY06694
AIX 5.1
IX89419
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0090V000239 Category I
4
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G519
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
The CDE Subprocess Control Service has a buffer overflow
vulnerability.
Reference:
IAVA 2002-A-0001
18. IAVA0095 – 2001-T-0015 LPD Vulnerabilities
Vulnerable Systems:
BSDi BSD/OS Version 4.1 and earlier
Debian GNU/Linux 2.1 and 2.1r4
All released versions of FreeBSD 3.x and 4.x prior to 4.4-RELEASE; FreeBSD 4.3-STABLE and 3.5.1-
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 319
STABLE prior to the correction date.
Hewlett-Packard HP9000 Series 700/800 running HP-UX releases 10.01, 10.10, 10.20, 11.00, and 11.11
IBM AIX Versions 4.3 and AIX 5.1
Mandrake Linux Versions 6.0, 6.1, 7.0, 7.1
NetBSD 1.5.2 and earlier
OpenBSD Version 2.9 and earlier
Red Hat Linux 6.0, 6.2 all architectures
SCO OpenServer Version 5.0.6a and earlier
SGI IRIX 6.5-6.5.13
Sun Solaris 2.6, 7 and 8
SuSE Linux Versions 6.1, 6.2, 6.3, 6.4, 7.0, 7.1, 7.2
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris 2.6
Solaris 2.6x86
Solaris 2.7
Solaris 2.7x86
Solaris 2.8
Solaris 2.8x86
106235-10
106236-10
107115-10
107116-10
109320-05
109321-05
HP-UX 10.01
PHCO_25107
HP-UX 10.10
PHCO_25108
HP-UX 10.20
PHCO_25109
HP-UX 11.00
PHCO_25110
HP-UX 11.11
PHCO_25111
HP-UX 11.20
PHCO_24868
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 320
IRIX 6.2 – 6.5.2
Patch not available
IRIX 6.5.3.1.1
Patch not available
AIX 4.3
IY23037
AIX 5.1
IY23041
Linux ALL
lpr package of version 0.48 or greater
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0095V000239 Category II
5
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G521
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are Multiple Vulnerabilities in the BSD line printer daemon.
Reference:
IAVA 2001-T-0015
19. IAVA0100 – 2005-T-0014 Multiple Vulnerabilities in Mozilla Firefox
Vulnerable Systems:
Mozilla Firefox 1.0.3 and earlier.
Compliance Checking:
# find / -name firefox
If Firefox is found, confirm the version is 1.0.4 or later.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 321
# /<firefox_binary> -v
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0100V000701 Category II
9
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
G522
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are multiple vulnerabilities in Mozilla Firefox.
Reference:
IAVA 2005-T-0014
20. IAVA0105 – 2001-A-0014 Login Daemon
Vulnerable Systems:
Sun Solaris 8/SunOS 5.8 and earlier
IBM 4.3 and 5.1
SCO OpenServer 5.0.6a and earlier
SGI 3.x
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris
2.5.1
106160-02
Solaris
2.5.1_x86
106161-02
Solaris
2.6
105665-04
Solaris
2.6_x86
105666-04
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Solaris
2.7
Solaris
2.7_x86
Solaris
2.8
Solaris
2.8_x86
Page 322
112300-01
112301-01
111085-02 – Obsoleted by 108993-02
111086-02 – Obsoleted by 108994-02
IRIX 3.x
Patch will not be available – upgrade to 6.5.13
AIX 4.3
IY26443
AIX 5.1
IY26221
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0105V000239 Category I
6
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G523
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
The login utility has a buffer overflow vulnerability.
Reference:
IAVA 2001-A-0014
21. IAVA0110 – 2005-B-0012 PAWS DoS Vulnerability
Vulnerable Systems:
FreeBSD FreeBSD –prior to 5.4.0
OpenBSD OpenBSD 3.0.0
OpenBSD OpenBSD 3.1.0
OpenBSD OpenBSD 3.2.0
OpenBSD OpenBSD 3.3.0
OpenBSD OpenBSD 3.4.0
OpenBSD OpenBSD 3.5.0
OpenBSD OpenBSD 3.6.0
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 323
SCO Open Server 6.0.0
SCO Unixware 7.1.3
SCO Unixware 7.1.4
Compliance Checking:
Ensure the SA has installed the applicable patch or upgraded to the latest non-vulnerable version of FreeBSD
and/or OpenBSD.
Patch OpenBSD with patch 015_tcp.patch.
FreeBSD
Download the relevant patch from the location below.
FreeBSD 4.x
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/tcp4.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/tcp4.patch.asc
FreeBSD 5.x
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/
tcp.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/
tcp.patch.asc
SCO
Upgrade the affected binaries from:
#
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.64
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 324
IAVA0110V000702 Category II
0
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
G524
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There is a DoS PAWS vulnerability.
Reference:
IAVA 2005-B-0012
22. IAVA0115 – 2002-A-SNMP-0002, 2002-A-SNMP-003 SNMP
Vulnerable Systems:
CacheOS 3.1.22, 4.0.15, 4.1.02
Compaq
NonStop Himalaya Servers
TCP/ip Services for OpenVMS
Tru64 Unix
Insight Management Suite
Deskpro
Professional Workstation (Armada)
SANworks
Hewlett-Packard Company
HP 9000 Series 700 and Series 800 running HP-UX releases 10.X,11.X
HP Procurve switches
JetDirect Firmware (older versions only)
MC/ServiceGuard, EMS HA Monitors
iPlanet
Netscape Directory Server V4.12-V4.16 for Unix
iPlanet Directory Server V5.0SP1 & 5.1 for Unix
iPlanet Web Proxy Server V3.6 for Unix
Oracle
Oracle7 Database, Release 7.3.x
Oracle8 Database, Releases 8.0.x
Oracle8i Database, Releases 8.1.x
Oracle9i Database, Release 9.0.1.x
Sun Microsystems, Inc.
Solstice Enterprise Agents (SEA)
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 325
Concord Communications
eHealth Console version 5.0.2 P1
eHealth Console version 4.8 P8
eHealth TrapEXPLODER 1.3
Netscreen
ScreenOS - all versions
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris 2.6
Solaris 2.6_x86
Solaris 2.7
Solaris 2.7_x86
Solaris 2.8
Solaris 2.8_x86
106787-18
106872-18
107709-19
107710-19
108869-16
108870-16
HP-UX 10.20
PHSS_26137
HP-UX 11.00
PHSS_26138
AIX 4.3
IY17630
AIX 5.1
IY20943
Initially, this is a CAT I if the IAVA has not been applied. Additional requirements have been added:
If the snmp version is 3 or greater, this is not a finding .
If the snmp version is 1 or 2, or does not have all the patches, or has open IAVAs for snmp it is a CAT I.
If it is version 1 or 2, fully patched, with no snmp IAVAs open, but there is no formally documented plan to
migrate to version 3, it is a CAT II.
If it is version 1 or 2, is fully patched, and all IAVAs are applied, and there is a formally documented plan to
migrate to version 3, this is a CAT III.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 326
To check the version of snmpd :
1. Locate the snmpd daemon:
Solaris
/usr/lib/snmp/ snmpdx
HP-UX
/usr/sbin/ snmpd
Linux
/usr/sbin/ snmpd
AIX
/usr/sbin/ snmpdm
2. Find the version:
Solaris and HP-UX perform:
# strings SNMPDPROGRAM | grep snmpV
The version will show up as snmpV2 or snmpV3 . If it is version 1, no value is returned.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0115V000265 Category:I
5
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G525
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
SNMPv1 has vulnerable trap handling in the GetRequest and
GetnRequest routines.
Reference:
IAVA 2002-A-SNMP-002, 2002-A-SNMP-003
23. IAVA0120 – 2005-A-0005 Multiple Vulnerabilities in BIND
Vulnerable Systems:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 327
ISC BIND 9.3.0
ISC BIND 8.4.4
ISC BIND 8.4.5
Compliance Checking:
To examine the version number of named perform:
#
find / -name named
#
find / -name in.named
#
what in.named/named | grep –i version
#
strings in.named/named | grep –i version
#
named –v
#
named –d0
BIND 8.4.4, 8.4.5, and 9.3.0 are vulnerable, if any of these versions of BIND are installed and/or running, then
this is a finding.
Upgrade to BIND 8.4.6 or later, or BIND 9.3.1 or later.
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0120V000751 Category:I
7
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G526
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A vulnerable version of BIND is installed.
Reference:
IAVA 2005-A-0005
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 328
24. IAVA0125 – 2001-T-0018 SSH Short Password Vulnerability
Vulnerable Systems:
SSH Communications Security 3.0.0
SSH Communications Security 2.3 and 2.4, for HPUX 10.20 and 11.00 in (TCB)
Red Hat 6.2 Linux 6.1 thru 7.1
Solaris 2.6 thru 2.8
Caldera Linux 2.4
SuSE Linux 6.4 thru 7.0
Compliance Checking:
This check only applies to SSH by Communications Security.
To get the version, perform:
#
telnet localhost 22
Or
#
strings (ssh or sshd) | grep –I version
Or
# ssh –V
Upgrade to SSH Secure Shell 3.0.1 or later.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0125V000265 Category II
6
:
MAC/Confidentiality Levels:
IA Controls:
Status Code: PART
Previously:
G527
MAC I – CSP, MAC II – CSP, MAC III – CSP
DCSQ-1, VIVM-1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 329
PDI Description:
SSH, by Communications Security, has a short password
vulnerability.
Reference:
IAVA 2001-T-0018
25. IAVA0135 – 2001-B-0004 WU-FTPD
Vulnerable Systems:
Caldera thru 3.1
Cobalt QUBE 1.0
Connectiva thru 7.0
Debian thru 2.2
Mandrake thru 8.1
Red Hat thru 7.2
SuSE thru 7.3
immunix thru 7.0
and any other system using WU-FTPD or derivatives of it.
Compliance Checking:
To determine the version of ftpd, issue the following command:
# strings /usr/sbin/in.ftpd | grep –I version
The version must be 2.6.2, or later, or this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 330
IAVA0135V000265 Category:I
7
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G529
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
WUFTPD Has A Remote Code Execution Vulnerability.
Reference:
IAVA 2001-B-0004
26. IAVA0140 – 2005-T-0008 Multiple Vulnerabilities in Ethereal Software
Vulnerable Systems:
All Linux and Solaris operating systems with Ethereal prior to 0.10.10 are vulnerable.
Compliance Checking:
To determine the version of Ethereal, issue one of the following commands:
Load Ethereal and go to the Help->About Ethereal... menu item.
# ethereal –v
# tethereal -v
The version must be 0.10.10 or later, or this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0140V000751 Category I
9
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G530
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 331
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are multiple vulnerabilities in Ethereal Software.
Reference:
IAVA 2005-A-0008
27. IAVA0145 – 2002-T-0004 KTH Kerberos IV and V
Vulnerable Systems:
KTH Kerberos Development Team
BSDi
OpenBSD
FreeBSD
NetBSD
Compliance Checking:
This check is only applicable to KTH Kerberos version IV and V. MIT Kerberos is not vulnerable to this
condition. Patches are not available from the vendor at this time. Strictly enforce the client's preferences and
abort the connection if authentication or encryption cannot be negotiated. Reference OpenBSD and FreeBSD
man pages for telnet syntax to abort the connection if authentication or encryption cannot be negotiated.
Patches distributed by third parties other than KTH Kerberos are not recommended solutions due to the potential
for unreliability/interoperability issues and insecure or malicious coding.
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
PDI:
IAVA0145V000268 Category III
5
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G531
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Kerberos IV and V implementations have a telnet encryption
vulnerability.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 332
Reference:
IAVA 2002-T-0004
28. IAVA0150 – 2005-T-0010 Multiple Vulnerabilities in Sybase Software
Vulnerable Systems:
Sybase Adaptive Server Enterprise 12.5.3 and prior.
Compliance Checking:
To determine the version of Sybase, perform the following:
#
/usr/sybase/ASE-12_5/bin/dataserver –v
Upgrade to ASE 12.5.3 ESD#1 or later.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0150V000752 Category II
0
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
G532
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are multiple vulnerabilities in Sybase Software.
Reference:
IAVA 2005-T-0010
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 333
29. IAVA0155 – 2002-T-0008 Cachefsd Daemon
Vulnerable Systems:
Solaris 5.5.1
Solaris 5.5.1_x86
Solaris 5.6
Solaris 5.6_x86
Solaris 5.7
Solaris 5.7_x86
Solaris 5.8
Solaris 5.8_x86
Solaris 5.9
Solaris 5.9_x86
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris 5.5.1
Solaris 5.5.1_x86
Solaris 5.6
Solaris 5.6_x86
104849-09
104848-09
105693-13
105694-13
Solaris 5.7
108800-02
Solaris 5.7_x86
108801-02
Solaris 5.8
110896-02
Solaris 5.8_x86
110897-02
Solaris 5.9
114008-01
Solaris 5.9_x86
114009-01
Remediation Guidelines:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 334
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0155V000284 Category I
9
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G533
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A buffer overflow vulnerability exists in the Sun Solaris cachefsd
daemon.
Reference:
IAVA 2002-T-0008
30. IAVA0160 – 2005-T-0017 IBM WebSphere Application Server
Vulnerable Systems:
IBM Websphere Application Server 5.0.2
IBM Websphere Application Server 5.0.2 .1
IBM Websphere Application Server 5.0.2 .2
IBM Websphere Application Server 5.0.2 .3
IBM Websphere Application Server 5.0.2 .4
IBM Websphere Application Server 5.0.2 .5
IBM Websphere Application Server 5.0.2 .6
IBM Websphere Application Server 5.0.2 .7
IBM Websphere Application Server 5.0.2 .8
IBM Websphere Application Server 5.0.2 .9
IBM Websphere Application Server 5.0.2 .10
Compliance Checking:
To determine the version of IBM Websphere Application Server, perform one of the following:
#
versionInfo
Or
#
genVersionReport
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 335
Generates the versionReport.html report file in the bin directory on Linux and UNIX-based platforms, or on
Windows platforms. The report includes the list of components, fixes, and fix packs.
Upgrade to version 5.0.2.11 or later.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0160V000752 Category II
1
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G534
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
IBM WebSphere Application Server Administrative Console
Buffer Overflow Vulnerability.
Reference:
IAVA 2005-T-0017
31. IAVA0165 – 2002-T-0009 Rpc.walld Service
Vulnerable Systems:
Solaris 5.5.1
Solaris 5.5.1_x86
Solaris 5.6
Solaris 5.6_x86
Solaris 5.7
Solaris 5.7_x86
Solaris 5.8
Solaris 5.8_x86
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 336
Solaris 5.9
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris 5.5.1
112891-01
Solaris 5.5.1_x86
112892-01
Solaris 5.6
112893-01
Solaris 5.6_x86
112894-01
Solaris 5.7
112899-01
Solaris 5.7_x86
112900-01
Solaris 5.8
112846-01
Solaris 5.8_x86
112847-01
Solaris 5.9
112875-01
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0165V000285 Category I
3
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G535
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
The Solaris rpc.rwall daemon service has a message format string
vulnerability.
Reference:
IAVA 2002-T-0009
32. IAVA0170 – 2005-T-0024 – Sun JRE Privilege Escalation Vulnerability
Vulnerable Systems:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 337
Blackdown Java 2 Runtime Environment 1.4.1
Blackdown Java 2 Runtime Environment 1.4.2
Blackdown Java 2 Runtime Environment 1.4.2 -01
Blackdown Java 2 Standard Edition SDK 1.4.1
Blackdown Java 2 Standard Edition SDK 1.4.2
Blackdown Java 2 Standard Edition SDK 1.4.2 -01
Conectiva Linux 10.0.0
Gentoo Linux
S.u.S.E. Linux Desktop 1.0.0
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Enterprise Server for S/390 9.0.0
S.u.S.E. Linux Personal 8.2.0
S.u.S.E. Linux Personal 9.0.0
S.u.S.E. Linux Personal 9.0.0 x86_64
S.u.S.E. Linux Personal 9.1.0
S.u.S.E. Linux Personal 9.1.0 x86_64
S.u.S.E. Linux Personal 9.2.0
S.u.S.E. Linux Personal 9.2.0 x86_64
S.u.S.E. Linux Personal 9.3.0
S.u.S.E. Linux Personal 9.3.0 x86_64
S.u.S.E. Linux Professional 8.2.0
S.u.S.E. Linux Professional 9.0.0
S.u.S.E. Linux Professional 9.0.0 x86_64
S.u.S.E. Linux Professional 9.1.0
S.u.S.E. Linux Professional 9.1.0 x86_64
S.u.S.E. Linux Professional 9.2.0
S.u.S.E. Linux Professional 9.2.0 x86_64
S.u.S.E. Linux Professional 9.3.0
S.u.S.E. Linux Professional 9.3.0 x86_64
S.u.S.E. Novell Linux Desktop 9.0.0
S.u.S.E. Open-Enterprise-Server 9.0.0
Slackware Linux -current
Slackware Linux 8.1.0
Slackware Linux 9.0.0
Slackware Linux 9.1.0
Slackware Linux 10.0.0
Slackware Linux 10.1.0
Sun Java 2 Runtime Environment 1.4.2
Sun Java 2 Runtime Environment 1.4.2 _01
Sun Java 2 Runtime Environment 1.4.2 _02
Sun Java 2 Runtime Environment 1.4.2 _03
Sun Java 2 Runtime Environment 1.4.2 _04
Sun Java 2 Runtime Environment 1.4.2 _05
Sun Java 2 Runtime Environment 1.4.2 _06
Sun Java 2 Runtime Environment 1.4.2 _07
Sun Java 2 Runtime Environment 1.5.0
Sun Java 2 Runtime Environment 1.5.0 .0_01
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 338
Sun Java 2 Standard Edition SDK 1.4.2
Sun Java 2 Standard Edition SDK 1.4.2 _01
Sun Java 2 Standard Edition SDK 1.4.2 _02
Sun Java 2 Standard Edition SDK 1.4.2 _03
Sun Java 2 Standard Edition SDK 1.4.2 _04
Sun Java 2 Standard Edition SDK 1.4.2 _05
Sun Java 2 Standard Edition SDK 1.4.2 _06
Sun Java 2 Standard Edition SDK 1.4.2 _07
Sun Java 2 Standard Edition SDK 1.5.0
Sun Java 2 Standard Edition SDK 1.5.0 .0_01
Compliance Checking:
To determine the version of Java on a system, the following command can be run:
# java –fullversion
Or
#
java –version
The version for 1.5 systems should be at least 1.5.0_02. The version for 1.4.2 systems should be at least 1.4.2_
08.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0170V000752 Category II
2
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
G536
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There is a Sun JRE Privilege Escalation Vulnerability.
Reference:
IAVA 2005-T-0024
33. IAVA0175 – 2002-T-0011 OpenSSH Challenge Response
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 339
Vulnerable Systems:
OpenSSH: Versions 2.3.1p1 through version 3.3 are vulnerable.
OpenLinux 3.1.1 Server prior to and including openssh-3.2.3p1-2
OpenLinux 3.1.1 Workstation prior to and including openssh-3.2.3p1-2
OpenLinux 3.1 Server prior to and including openssh-3.2.3p1-2
OpenLinux 3.1 Workstation prior to and including openssh-3.2.3p1-2
CONECTIVA LINUX
Debian
6.0, 7.0, 8
FreeBSD
HP-UX Secure Shell A.03.10
HP-UX 11.11
HP-UX 11.0
Mandrake 7.1, 7.2, 8.0, 8.1, 8.2
Mandrake Corporate Server 1.0.1, Single Network Firewall 7.2
NetBSD-1.6_BETAx
NetBSD-1.5.2
NetBSD-1.5.1
NetBSD-1.5
OpenBSD
Red Hat Linux 7.0
Red Hat Linux 7.1
Red Hat Linux 7.2
Red Hat Linux 7.3
SuSE
Trustix Secure Linux 1.1, 1.2, 1.5
Compliance Checking:
OpenSSH versions 2.9.9 through 3.3 are vulnerable if the challenge response handling mechanism is
enabled. 2.3.1p1 through version 3.3 are susceptible to the vulnerability involving the PAM module using
interactive keyboard authentication.
To determine the version:
#
ssh –V
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 340
If the version of OpenSSH is less than 3.4, find and view the sshd_config file to make sure the
KbdInteractiveAuthentication and ChallengeResponseAuthentication options are set to no . If either one is yes,
or if the options are not in the sshd_config file, then this is a finding.
For SUN SSH distributed with Solaris 9:
The version of OpenSSH that is in Solaris 9 is not believed to be vulnerable if the default configuration is used. If
sshd_config (4) has been updated so that BOTH of the following entries are present then it is vulnerable.
PAMAuthenticationViaKBDInt yes
KbdInteractiveAuthentication yes
Use the procedures in Appendix F, Patch Control, to check if the following patches or package versions have
been loaded:
Solaris 5.9
113273-01
Solaris 5.9x86
114858-01
RedHat
openssh-3.1p1-5.src.rpm
SuSE
openssh-3.3p1-6.src.rpm
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0175V000292 Category I
6
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G537
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are vulnerabilities in the OpenSSH Challenge Response
Handling routine.
Reference:
IAVA 2002-T-0011
34. IAVA0180 – 2005-T-0025 Vulnerabilities in Adobe Reader
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 341
Vulnerable Systems:
Adobe Acrobat Reader (UNIX) 5.0.9
Adobe Acrobat Reader (UNIX) 5.0.10
Linux (all versions)
Solaris (all versions)
HP-UX (all versions)
IBM-AIX (all versions)
Compliance Checking:
To determine the version perform the following:
1. Launch Acrobat Reader by executing /bin/acroread
2. Select "help" menu option, and
3. Select "about Acrobat Reader."
Linux and Solaris Platforms
Update to Adobe Reader 7.0.1
IBM-AIX and HP-UX Platforms
Update to Adobe Acrobat Reader 5.0.11
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0180V000752 Category II
5
:
MAC/Confidentiality Levels:
IA Controls:
Status Code: PART
Previously:
G538
MAC I – CSP, MAC II – CSP, MAC III – CSP
DCSQ-1, VIVM-1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 342
PDI Description:
There are multiple vulnerabilities in Adobe Acrobat/Adobe Reader
Software.
Reference:
IAVA 2005-T-0025
35. IAVA0185 – 2005-T-0027 MIT Kerberos Multiple Vulnerabilities
Vulnerable Systems:
All MIT Kerberos 5 releases up to and including krb5-1.4.1 are vulnerable. Third party application servers
employing Kerberos 5 may be vulnerable as well.
Compliance Checking:
To determine the Kerberos version:
#
strings libkrb5.so | grep BRAND
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris 5.8
112237-13
Solaris 5.8_x86
112240-10
Solaris 5.9
112908-20
Solaris 5.9_x86
Solaris 5.10
115168-08
120469-01
Solaris 5.10_x86
RedHat
120470-01
krb5-workstation-1.4.1-5.i386.rpm
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 343
IAVA0185V000752 Category II
3
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G539
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Detected a MIT Kerberos vulnerability that causes a denial of
service.
Reference:
IAVA 2005-T-0027
36. IAVA0190 – 2005-T-0033 Adobe Reader Buffer Overflow
Vulnerable Systems:
Adobe Acrobat
Adobe Acrobat 5.0.0
Adobe Acrobat 5.0.5
Adobe Acrobat 6.0.0
Adobe Acrobat 6.0.1
Adobe Acrobat 6.0.2
Adobe Acrobat 6.0.3
Adobe Acrobat 7.0.0
Adobe Acrobat 7.0.1
Adobe Acrobat 7.0.2
Adobe Acrobat Reader
Adobe Acrobat Reader 5.1.0
Adobe Acrobat Reader 6.0.0
Adobe Acrobat Reader 6.0.1
Adobe Acrobat Reader 6.0.2
Adobe Acrobat Reader 6.0.3
Adobe Acrobat Reader 7.0.0
Adobe Acrobat Reader 7.0.1
Adobe Acrobat Reader 7.0.2
Adobe Acrobat Reader (UNIX) 7.0.0
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 344
Compliance Checking:
To determine the version perform the following:
1. Launch Acrobat Reader by executing /bin/acroread
2. Select "help" menu option, and
4. Select "about Acrobat Reader."
The version for all unix systems should be at least 7.0.1.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0190V000752 Category II
4
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G540
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Adobe Acrobat and Adobe Reader Remote Buffer Overflow
Vulnerability.
Reference:
IAVA 2005-T-0033
37. IAVA0195 – 2002-T-0012 CDE Vulnerability
Vulnerable Systems:
All Unix operating systems running CDE ToolTalk
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 345
Compliance Checking:
Use the procedures in Appendix F, Patch Control, to check if the following patches or package versions have
been loaded:
SOLARIS
Solaris 2.5.1
104489-15
Solaris 2.5.1_x86
105496-13
Solaris 2.6
105802-19
Solaris 2.6x86
Solaris 2.7
Solaris 2.7x86
Solaris 2.8
Solaris 2.8x86
Solaris 2.9
105803-21
107893-20
107894-19
110286-10
110287-10
112808-03
HP-UX
HP-UX 10.10
Replace daemon
HP-UX 10.20
PHSS_27426
HP-UX 11.00
PHSS_27427
HP-UX 11.11
Replace daemon
IRIX
IRIX 6.2 – 6.5.2
IRIX 6.5.3.1.1
Patch 4799
Patch 4799
AIX
AIX 4.3.3
IY32368
AIX5.1.1.
IY32370
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 346
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0195V000297 Category II
2
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G541
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are multiple vulnerabilities in the Common Desktop
Environment Tooltalk database server, rpc.ttdbserverd.
Reference:
IAVA 2002-T-0012
38. IAVA0210 – 2005-T-0038 Java System Server JAR Disclosure
Vulnerable Systems:
SPARC Platform
Sun Java System Application Server Platform Edition 8.1 2005 Q1
Sun Java System Applciation Server Platform Edition 8.1 2005 Q1 UR1
Sun Java System Applciation Server Enterprise Edition 8.1 2005 Q1 without (file-based) patch
119169-01 or (SVR4) patch 119166-06
x86 Platform
Sun Java System Application Server Platform Edition 8.1 2005 Q1
Sun Java System Application Server Platform Edition 8.1 2005 Q1 UR1
Sun Java System Application Server Enterprise Edition 8.1 2005 Q1 without (file based) patch
119170-01 or (SVR4) patch 119167-06
Linux Platform
Sun Java System Application Server Platform Edition 8.1 2005 Q1
Sun Java System Application Server Platform Edition 8.1 2005 Q1 UR1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 347
Sun Java System Application Server Enterprise Edition 8.1 2005 Q1 without (file based) patch
119171-01 or RHEL2.1/RHEL3.0 (Pkg_patch) 119168-05
Compliance Checking:
To determine the version of Sun Java System Application server, the following command can be run:
# <AS_INSTALL>/bin/asadmin version --verbose
(Where <AS_INSTALL> is the installation directory of the Application Server)
Perform procedures in Appendix F, Patch Control, to check for one of the patches:
SPARC Platform
x86 Platform
Linux
119169-01
119170-01
119171-01
or
or
or
119166-06
119167-06
119168-05
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0210V000752 Category II
7
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G544
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Sun Java System Application Server information disclosure
vulnerability.
Reference:
IAVA 2005-T-0038
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 348
39. IAVA0215 – 2002-A-0004 OpenSSL Vulnerability
Vulnerable Systems:
Any product using one of the following:
OpenSSL prior to 0.9.6e, up to and including pre-release 0.9.7-beta2
OpenSSL pre-release 0.9.7-beta2 and prior with Kerberos enabled
SSLeay library
Compliance Checking:
Locate the binary openssl:
# find / -name openssl
# ./openssl version
The required version must be 0.9.6e or 0.9.7-beta3 or higher.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0215V000324 Category II
6
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G545
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
OpenSSL has multiple vulnerabilities.
Reference:
IAVA 2002-A-0004
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 349
40. IAVA0225 – 2002-B-0003 PHP Vulnerabilities
Vulnerable Systems:
PHP 3.0.10-3.0.18
PHP 4.0.1-4.0.3pl1
PHP 4.0.2-4.0.5
PHP 4.0.6-4.0.7RC2
PHP 4.0.7RC3-4.1.1
PHP 4.2.0 and 4.2.1
Compliance Checking:
Locate the directory where the web server html documents are stored. Create a file by:
#
echo “<? phpinfo(); ?>”>fso.php
Direct a web browser to http://localhost/fso.php and examine the screen for the version. Under the HTTP
Response Headers, the X-Powered-By row will show the PHP version.
Or
#
php -v
The required version is PHP-4.2.3 or higher.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0225V000324 Category II
7
:
http://s3.amazonaws.com/0706/819143.html
Status Code: PART
Previously:
G547
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
MAC/Confidentiality Levels:
Page 350
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
The Hypertext Preprocessor - PHP versions 4.2.0 and 4.2.1 - has
multiple vulnerabilities.
Reference:
IAVA 2002-B-0003
41. IAVA0235 – 2002-T-0015 XDR-Libraries
Vulnerable Systems:
Solaris 5.5.1
Solaris 5.5.1_x86
Solaris 5.6
Solaris 5.6_x86
Solaris 5.7
Solaris 5.7_x86
Solaris 5.8
Solaris 5.8_x86
Solaris 5.9
HP-UX 10.01
HP-UX 10.10
HP-UX 10.20
HP-UX 11.00
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris 5.5.1
Solaris 5.5.1_x86
Solaris 5.6
Solaris 5.6_x86
103640-42
103641-42
105401-39
105402-39
http://s3.amazonaws.com/0706/819143.html
PLUS
PLUS
106639-07
106640-07
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 351
Solaris 5.7
106942-22
PLUS
108451-06
Solaris 5.7_x86
106943-22
PLUS
108452-06
Solaris 5.8
108827-30 – Obsoleted by 108993-18
PLUS
108901-06 – Obsoleted by 108528-24
Solaris 5.8_x86
108828-31 – Obsoleted by 108994-18
PLUS
108902-05 – Obsoleted by 108529-24
Solaris 5.9
HP-UX 10.01
113319-01
PLUS
112233-02
Patch will not be available – upgrade to 11.0 or higher
HP-UX 10.10
Patch will not be available – upgrade to 11.0 or higher
HP-UX 10.20
PHNE_25234
HP-UX 11.00
PHNE_26387
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0235V000324 Category I
8
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G549
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Sun remote procedure call (Sun-Rpc) derived external data
representation (XDR) libraries contain an integer overflow
vulnerability.
Reference:
IAVA 2002-T-0015
42. IAVA0245 – 2002-T-0016 KAdmind
Vulnerable Systems:
Conectiva Linux 8.0 running MIT Kerberos 5 1.2.3
Debian GNU/Linux 3.0
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 352
FreeBSD 4.4
FreeBSD 4.5
FreeBSD 4.6
FreeBSD 4.7
Kerberos 4 Release 1.2
Kerberos 5
MandrakeSoft 8.1
MandrakeSoft 8.2
MandrakeSoft 9.0
MIT Kerberos 5, up to and including krb5-1.2.6.
All Kerberos 4 implementations derived from MIT Kerberos 4
OpenBSD 3.0
OpenBSD 3.1
OpenBSD 3.2
Red Hat 6.2
Red Hat 7.0
Red Hat 7.1
Red Hat 7.2
Red Hat 7.3
Red Hat 8.0
Compliance Checking:
The version for Kerberos can be checked either with:
# krb5-config –version
Or
#
strings libkrb5.so | grep –i brand
The version must be 1.2.5-7 or higher.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 353
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0245V000332 Category:I
9
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G551
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Kadmind has a remote buffer overflow vulnerability.
Reference:
IAVA 2002-T-0016
43. IAVA0250 – 2005-A-0019 Oracle Applications Vulnerabilities
Vulnerable Systems:
Oracle E-Business Suite and Applications Release 11i, versions 11.5.1 through 11.5.10
Oracle E-Business Suite and Applications Release 11.0
Oracle JInitiator, versions 1.1.8, 1.3.1
Oracle Workflow, versions 11.5.1 through 11.5.9.5
Compliance Checking:
Check for compliance by using the Oracle Installer, the GUI interface for installation. The patches listed are
spot checks for mulitiple-patch requirements based on version and platform. Please note whether each check is
for one of a group or requires two or more specific patches to complete the spot check.
Swith user to an account used for Oracle installations. This will ensure the environment variables are set
correctly.
Start the Oracle Installer with the command:
$ORACLE_HOME/bin/runInstaller
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 354
When the Welcome screen displays, click on the Installed Products button at the bottom of the screen. Expand
each Oracle Home. If Oracle Database Server, Oracle Application Server, or Oracle HTTP Server is/are listed,
then expand the Oneoffs selection and view the installed patches.
Please ensure one of the below mentioned patches is installed;
3966175
4074867
Note: Repeat for each Oracle installation.
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0250V000753 Category I
4
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
G552
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are multiple vulnerabilities in Oracle E-Business and
Applications Suite.
Reference:
IAVA 2005-A-0019
44. IAVA0255 – 2002-T-0017 X Font Server
Vulnerable Systems:
Solaris 5.6
Solaris 5.6x86
Solaris 5.7
Solaris 5.7x86
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 355
Solaris 5.8
Solaris 5.8x86
Solaris 5.9
HP-UX 10.20
HP-UX 11.0
HP-UX 11.11
HP-UX 11.12
AIX 4.3.3
AIX 5.1.0
AIX 5.2.0
Compliance Checking:
Use the procedures in Appendix F, Patch Control, to check for these patches or versions:
Solaris 5.6
Solaris 5.6x86
Solaris 5.7
Solaris 5.7x86
Solaris 5.8
Solaris 5.8x86
Solaris 5.9
108129-05
108130-05
108117-06
108118-06
109862-03
109863-03
113923-02
HP-UX 10.20
PHSS_28468
HP-UX 11.0
PHSS_28469
HP-UX 11.11
PHSS_28470
HP-UX 11.12
PHSS_28471
AIX 4.3.3
IY37888
AIX 5.1.0
IY37886
AIX 5.2.0
IY37889
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 356
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
PDI:
IAVA0255V000343 Category III
4
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G553
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There is an X Font server buffer overflow vulnerability.
Reference:
IAVA 2002-T-0017
45. IAVA0260 – 2005-A-0034 Oracle Applications Vulnerabilities
Vulnerable Systems:
Oracle E-Business Suite and Applications Release 11i, versions 11.5.1 through 11.5.10
Oracle E-Business Suite and Applications Release 11.0
Oracle JInitiator, versions 1.1.8, 1.3.1
Oracle Workflow, versions 11.5.1 through 11.5.9.5
Compliance Checking:
Check for compliance by using the Oracle Installer, the GUI interface for installation. The patches listed are
spot checks for mulitiple-patch requirements based on version and platform. Please note whether each check is
for one of a group or requires two or more specific patches to complete the spot check.
Swith user to an account used for Oracle installations. This will ensure the environment variables are set
correctly.
Start the Oracle Installer with the command:
$ORACLE_HOME/bin/runInstaller
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 357
When the Welcome screen displays, click on the Installed Products button at the bottom of the screen. Expand
each Oracle Home. If Oracle Database Server, Oracle Application Server, or Oracle HTTP Server is/are listed,
then expand the Oneoffs selection and view the installed patches.
Please ensure one of the below mentioned patches is installed;
3904641
4613714
Note: Repeat for each Oracle installation.
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0260V000753 Category I
5
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
G554
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are multiple vulnerabilities in Oracle E-Business and
Applications Suite.
Reference:
IAVA 2005-A-0034
46. IAVA0270 – 2000-B-0008 BIND 8.2.2-P6 DoS Vulnerabilities
Vulnerable Systems:
Caldera OpenLinux Desktop 2.3
Caldera UnixWare 7.1.1
Conectiva Linux 6.0
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 358
Conectiva Linux 5.1
Conectiva Linux 5.0
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 4.0 es
Conectiva Linux 4.0
Debian Linux 2.3
Debian Linux 2.2
IBM AIX 4.3.3
IBM AIX 4.3.2
IBM AIX 4.3.1
IBM AIX 4.3
MandrakeSoft Corporate Server 1.0.1
MandrakeSoft Linux Mandrake 7.2
MandrakeSoft Linux Mandrake 7.1
MandrakeSoft Linux Mandrake 7.0
MandrakeSoft Linux Mandrake 6.1
MandrakeSoft Linux Mandrake 6.0
MandrakeSoft Single Network Firewall 7.2
RedHat Linux 7.0 J
RedHat Linux 6.2
RedHat Linux 6.1
RedHat Linux 6.0
RedHat Linux 6.0
RedHat Linux 5.2
S.u.S.E. Linux 6.4
S.u.S.E. Linux 6.3
S.u.S.E. Linux 6.2
S.u.S.E. Linux 6.1
S.u.S.E. Linux 6.0
SCO eDesktop 2.4
SCO eServer 2.3
Trustix Trustix Secure Linux 1.1
Trustix Trustix Secure Linux 1.0
Compliance Checking:
To examine the version number of named perform:
#
find / -name named
#
find / -name in.named
#
#
what in.named/named | grep –i version
strings in.named/named | grep –i version
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 359
BIND 8.2.2 through 8.2.2P6 (BIND 8.2.2P7 and 8.2.3 are not vulnerable) is vulnerable.
Upgrade to BIND 8.2.3 or later.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0270V000752 Category:I
8
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G556
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A vulnerable version of BIND is installed.
Reference:
IAVA 2000-B-0008
47. IAVA0275 – 2001-A-0001 Buffer Overflows in ISC BIND
Vulnerable Systems:
BIND 8.2.2
BIND 4.9.5 - 4.9.7
BIND 4.9.3 - 4.9.5-P1
Compliance Checking:
To examine the version number of named perform:
#
find / -name named
#
find / -name in.named
#
what in.named/named | grep –i version
#
strings in.named/named | grep –i version
#
named –v
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
#
Page 360
named –d0
Users of BIND 4.9.x or 8.2.2 must upgrade to BIND 8.2.3 or later, or BIND 9.1 or later.
Because BIND 4 is no longer actively maintained, users must upgrade to either BIND 8.2.3 or later, or BIND 9.1
or later
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0275V000752 Category:I
9
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G557
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A vulnerable version of BIND is installed.
Reference:
IAVA 2001-A-0001
48. IAVA0280 – 2002-A-0006 Multiple Vulnerabilities in ISC BIND 4 and 8
Vulnerable Systems:
BIND versions 4.9.2 to 4.9.10
BIND versions 8.1
BIND versions 8.2 to 8.2.6
BIND versions 8.3.0 to 8.3.3
Conectiva Linux 6.0
Debian Linux 3.0
Debian Linux 2.2
Secure Linux 1.0.1
FreeBSD 4.4, 4.5, 4.6, 4.7
Mandrake Linux 7.2
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 361
OpenBSD 3.0, 3.1, 3.2
OpenPKG 1.0, 1.1
Openwall GNU/*/Linux
SuSE 7.0, 7.1, 7.2, 7.3, 8.0, 8.1
SuSE Linux Database Server
SuSE eMail Server III, 3.1
SuSE Firewall
SuSE Linux Enterprise Server for S/390
SuSE Linux Connectivity Server
SuSE Linux Enterprise Server 7
SuSE Linux Office Server
Trustix Secure Linux 1.5
Trustix Secure Linux 1.2
Compliance Checking:
To examine the version number of named perform:
#
find / -name named
#
find / -name in.named
#
what in.named/named | grep –i version
#
strings in.named/named | grep –i version
#
named –v
#
named –d0
Upgrade to BIND 8.4.6 or later, or 9.2.1 or later.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0280V000753 Category:I
0
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G558
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 362
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A vulnerable version of BIND is installed.
Reference:
IAVA 2002-A-0006
49. IAVA0285 – 2003-B-0001 DNS Vulnerabilities – Various Libraries
Vulnerable Systems:
Caldera
Compaq
Conectiva
Debian
Engarde
FreeBSD
GNU
Hewlett-Packard (HP)
IBM AIX
Internet Software Consortium (ISC) BIND
Mandrake
NetBSD
OpenBSD
Red Hat
SCO
Sun Microsystems
Trustix
Compliance Checking:
To examine the version number of named perform:
#
find / -name named
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 363
#
#
find / -name in.named
what in.named/named | grep –i version
#
strings in.named/named | grep –i version
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris
Solaris 2.5.1
103663-19
Solaris 2.5.1_x86
103664-19
Solaris 2.6
105755-12
Solaris 2.6_x86
105756-12
Solaris 7
106938-06
Solaris 7_x86
Solaris 8
Solaris 8_x86
Solaris 9
106939-06
109326-09
109327-09
112970-02
HP-UX
HP-UX 10.10
PHNE_27792
HP-UX 10.20
PHNE_27792
HP-UX 11.0
PHNE_27793
HP-UX 11.04
PHNE_28415
HP-UX 11.11
PHNE_27794
AIX 4.3
ISC BIND 8.2.2 p5
AIX
AIX 4.3.1
ISC BIND 8.2.2 p5
AIX 4.3.2
ISC BIND 8.2.2 p5
AIX 4.3.3
ISC BIND 8.2.2 p5
AIX 5.1
glibc 2.1.1-2.1.6
glibc 2.1.1-2.1.6
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 364
Red Hat
glibc-2.1.3-24.rpm
bind-9.2.1-0.6x.3.rpm
Remediation Guidelines:
Apply the applicable patch, upgrade to, at the least, the required software release, or remove the
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0285V000360 Category I
9
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G559
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are multiple buffer overflow vulnerabilities in various DNS
libraries.
Reference:
IAVA 2003-B-0001
50. IAVA0295 – 2003-T-0001 Multiple SSH Vulnerabilities
Vulnerable Systems:
F-Secure SSH versions 3.1.0 build 11 and earlier
Pragma SecureShell 2.0
Compliance Checking:
To determine the ssh version:
#
ssh –V
Pragma Secure Shell
F-Secure
Upgrade to 3.0
Upgrade to a higher release than 3.1.0 build 11
Remediation Guidelines:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 365
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
PDI:
IAVA0295V000361 Category III
2
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G561
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are multiple SSH vulnerabilities.
Reference:
IAVA 2003-T-0001
51. IAVA0305 – 2003-T-0002 Solaris UUCP
Vulnerable Systems:
Solaris 8
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris 5.8_x86
Solaris 5.8
111571-04
111570-04
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 366
IAVA0305V000361 Category III
3
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G563
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There is a Solaris UUCP local buffer overflow vulnerability.
Reference:
IAVA 2003-T-0002
52. IAVA0310 – 2005-T-0043 SMC HTTP TRACE Vulnerability
Vulnerable Systems:
Solaris 10.0 _x86
Solaris 10.0
Solaris 9.0 _x86
Solaris 9.0
Solaris 8.0 _x86
Solaris 8.0
Compliance Checking:
Use the procedures in Appendix F, Patch Control, to check if the following patches have been loaded:
Solaris
5.8
5.8_x86
5.9
5.9_x86
5.10
5.10_x86
111313-03
111314-03
116807-02
116808-02
121308-01
121309-01
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 367
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0310V000754 Category II
4
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G564
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There is an SMC HTTP TRACE Information Discloser
Vulnerability .
Reference:
IAVA 2005-T-0043
53. IAVA0315 – 2003-T-0004 Oracle 9i Vulnerabilities
Vulnerable Systems:
Oracle 9i Release 9.0.2 and 9.0.3
Compliance Checking:
Swith user to an account used for Oracle installations. This will ensure the environment variables are set
correctly.
Start the Oracle Installer with the command:
$ORACLE_HOME/bin/runInstaller
When the Welcome screen displays, click on the Installed Products button at the bottom of the screen. Expand
each Oracle Home to find the version.
Note: Repeat for each Oracle installation.
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 368
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
PDI:
IAVA0315V000361 Category III
6
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G567
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are Multiple Vulnerabilities in Oracle 9i Application Server.
Reference:
IAVA 2003-T-0004
54. IAVA0320 – 2003-T-0007 Sun XDR Library Buffer Overflow
Vulnerable Systems:
Debian with Kerberos krb4 and krb5
EnGarde
1.0.1
FreeBSD
4.6, 4.7, 5.0
GNU
glibc versions 2.2 - 2.2.5, 2.1.3
HP-UX with Kerberos - 9000/700 and 9000/800 series 10.20, 11.00, 11.04, 11.11, and 11.22
NETBSD 1.4 - 1.5.3
Red Hat Linux 6.2 - i386, 7.0 - i386 i686, 7.1 - i386 i686, 7.2 - i386 i686 ia4, 7.3 - i386 i686, 8.0 - i386
i686
Sun Solaris
2.5.1 - 9.0 both sparc and x86
Trustix 1.1 1.2 and 1.5
Compliance Checking:
Use the procedures in Appendix F, Patch Control, to check if the following patches have been loaded:
Solaris
5.6
5.6_x86
5.7
105401-44
105402-44
106942-27
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
5.7_x86
5.8
5.8_x86
5.9
5.9_x86
Page 369
106943-27
108993-18
108994-18
113319-11
113719-04
HP-UX
B.10.20
PHCO_26158 or PHCO_31920
B.10.24
PHCO_27882 or PHNE_30377 or PHNE_30660 or PHNE_31096
B.11.00P
B.11.11
PHNE_28567 or PHNE_28982 or PHNE_29210 or PHNE_29785 or PHNE_
29882 or PHNE_30377 or PHNE_30660 or PHNE_31096
PHNE_28568 or PHNE_28983 or PHNE_29211 or PHNE_29783 or PHNE_29883
or PHNE_30378 or PHNE_30380 or PHNE_30661
Red Hat
6.2
glibc-2.1.3-29.i386.rpm
7.0
glibc-2.2.4-18.7.0.9.i386.rpm
7.1
glibc-2.2.4-32.i386.rpm
7.2
glibc-2.2.4-32.i386.rpm
7.3
glibc-2.2.5-43.i386.rpm
8. glibc-2.3.2-4.80.i386.rpm
9. krb5-libs-1.2.7-14.i386.rpm
SuSE
1. glibc-2.2-26.i386.rpm
2. glibc-2.2.2-68.i386.rpm
3. glibc-2.2.4-78.i386.rpm
8.0
8.1
glibc-2.2.5-177.i386.rpm
glibc-2.2.5-177.i686.rpm
IRIX
6.5.15m
6.5.15f
6.5.16m
4986
4987
4988
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 370
6.5.16f
6.5.17m
4989
4990
6.5.17f
6.5.18m
4991
5014
6.5.18f
6.5.19m
5015
4992
6.5.19f
4993
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0320V000361 Category II
5
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G569
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
The Sun XDR Library has an integer overflow vulnerability.
Reference:
IAVA 2003-T-0007
55. IAVA0330 – 2003-B-0003 Sendmail - Memory Corruption Vulnerability
Vulnerable Systems:
Sendmail Versions 8.12.8 and earlier
Conectiva Linux 9.0
Conectiva Linux 8.0
Conectiva Linux 7.0
Conectiva Linux 6.0
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 371
Debian Linux 3.0
FreeBSD 5.0
FreeBSD 4.7
FreeBSD 4.6
HP TRU64 5.1
HP-UX 10.10
HP-UX 10.20
HP-UX 11.00
HP-UX 11.04
HP-UX 11.11
HP-UX 11.22
ImmunixOS 6.2
ImmunixOS 7.0
ImmunixOS 7+
AIX 4.3.3
AIX 5.1.0
AIX 5.2.0
MandrakeSoft Linux Mandrake 9.1
NetBSD 1.6
NetBSD 1.5.3
NetBSD 1.5.2
NetBSD 1.5.1
NetBSD 1.5
OpenBSD 3.2
OpenBSD 3.1
OpenPKG Current
OpenPKG 1.2
OpenPKG 1.1
Red Hat Linux 6.2
Red Hat Linux 7.0
Red Hat Linux 7.1
Red Hat Linux 7.2
Red Hat Linux 7.3
Red Hat Linux 8.0
Red Hat Linux 9.0
OpenLinux 3.1.1
OpenLinux 3.1
UnixWare 7.1.3
Open UNIX 8.0.0
IRIX 6.5.15
IRIX 6.5.16
IRIX 6.5.17
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 372
IRIX 6.5.18
IRIX 6.5.19
Solaris 2.6
Solaris 7
Solaris 8
Solaris 9
SuSE Linux 7.1, 7.2, 7.3, 8.0, 8.1, 8.2
SuSE Linux Database Server
SuSE Linux Enterprise Server 7, 8
SuSE Linux Firewall on CD/Admin host
SuSE Linux Connectivity Server
SuSE Linux Office Server
Slackware 8.0
Slackware 8.1
Slackware 9.0
Compliance Checking:
To determine the version of sendmail, use the following command:
# sendmail -d0 -bt < /dev/null | grep -i Version
Systems using sendmail below version 8.12.9, or are not patched, are affected.
Upgrade to 8.12.9 or check for the following patches utilizing Appendix F:
Solaris
Solaris 2.6
Solaris 2.6_x86
Solaris 7
Solaris 7_x86
105395-09
105396-09
107684-09
107685-09
Solaris 8
110615-09
Solaris 8_x86
110616-09
Solaris 9
Solaris 9_x86
113575-04
114137-03
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 373
HP-UX
If a fix has been installed the following command will list a 'version.c" line:
#
what /usr/sbin/sendmail | grep JAGae58098
Install HPSecurityBul246.depot with swinstall for all versions.
Red Hat
Red Hat Linux 6.2
sendmail-8.11.6-1.62.3.i386.rpm
Red Hat Linux 7.0
sendmail-8.11.6-25.70.i386.rpm
Red Hat Linux 7.1
sendmail-8.11.6-25.71.i386.rpm
Red Hat Linux 7.2
sendmail-8.11.6-25.72.i386.rpm
Red Hat Linux 7.3
sendmail-8.11.6-25.73. i386.rpm
Red Hat Linux 8.0
sendmail-8.12.8-5.80.i386.rpm
Red Hat Linux 9
sendmail-8.12.8-5.90.i386.rpm
AIX
AIX 4.3.3
IY42629
AIX 5.1.0
IY42630
AIX 5.2.0
IY42631
SuSE-7.1
sendmail-8.11.2-45.i386.rpm
SuSE
SuSE-7.2
sendmail-8.11.3-108.i386.rpm
SuSE-7.3
sendmail-8.11.6-164.i386.rpm
SuSE-8.0
sendmail-8.12.3-75.i386.rpm
SuSE-8.1
sendmail-8.12.6-109.i586.rpm
IRIX
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
All Version
Page 374
patch #5045
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0330V000368 Category II
1
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G575
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Sendmail memory corruption Vulnerability.
Reference:
IAVA 2003-B-0003
56. IAVA0335 – 2003-T-0015 PDF Writers
Vulnerable Systems:
Adobe Acrobat Reader (UNIX) 5.0.0 6
Xpdf Xpdf 1.0.0 1
MandrakeSoft Linux Mandrake 7.2.0
MandrakeSoft Linux Mandrake 8.0.0
MandrakeSoft Linux Mandrake 8.1.0
MandrakeSoft Linux Mandrake 8.2.0
Red Hat Linux 7.1
Red Hat Linux 7.2
Red Hat Linux 7.3
Red Hat Linux 8.0
Red Hat Linux 9
Sun Linux 5.0 (LX50) with xpdf-0.92-9 or earlier
Compliance Checking:
For both Red Hat and Sun Linux sytems:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 375
# rpm –qa |grep xpdf
Apply the appropriate rpm for the operating system version contained in the IAVA.
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0335V000373 Category II
9
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G577
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A PDF viewer has a Hyperlink arbitrary command vulnerability.
Reference:
IAVA 2003-T-0015
57. IAVA0345 – 2003-T-0018 Real Networks Helix Server
Vulnerable Systems:
Helix Universal Server 9
Real Server 5
Real Server 6
Real Server 7
Real Server 9
Real Server G2
Compliance Checking:
Use the following command to verify if the Real Server plug-in is installed:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
#
Page 376
find / -name *vsrcplin.so*
If the find returns either vsrcplin.so.9.0 or vsrcplin.so.6.0, then this is a finding. Versions prior to
9.0.2.802 are affected, including Helix Universal Server 9, RealSystem Server 8, 7, and RealServer G2.
Upgrade to the latest software.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
PDI:
IAVA0345V000388 Category III
6
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G579
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
The RealNetworks Helix Server is vulnerable.
Reference:
IAVA 2003-T-0018
58. IAVA0350 – 2003-T-0020 OpenSSH Prior to 3.7.1
Vulnerable Systems:
Systems running versions of OpenSSH prior to 3.7.1
Systems that use or derive code from vulnerable versions of OpenSSH
Compliance Checking:
If Secure Shell is running, verify it is OpenSSH. If it is OpenSSH, check the version by locating the ssh
command and performing:
#
./ssh –V
The command will return the version. If it is less than 3.7.1, this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 377
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
PDI:
IAVA0350V000388 Category III
7
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G580
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There is a buffer mismanagement vulnerability in OpenSSH prior to
version 3.7.1.
Reference:
IAVA 2003-T-0020
59. IAVA0355 – 2003-A-0013 SADMIND
Vulnerable Systems:
This vulnerability applies only to Sun systems running the Solstice AdminSuite with sadmind implemented.
Compliance Checking:
The patches listed apply only to version 2.3 and later. If a version earlier than 2.3 is running, the site must
upgrade to 2.3 before installing any of the patches. To upgrade to Solstice 2.3 install the following patches:
Solstice AdminSuite patches to upgrade to Solstice 2.3:
Solaris 2.3
104468-20
Solaris 2.3_x86
104469-20
To resolve the vulnerability on the following and on systems with older AdminSuite installations, install patches
listed below immediately. Systems with versions prior to 2.3 must upgrade to 2.3 before installing patches, as
noted above.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 378
Solaris 5.9
116453-01
Soalris 5.9_x86
116454-01
Solaris 5.8
116455-01
Solaris 5.8_x86
116442-01
Trusted_Solaris_8
Solaris 7
116455-01
108662-01
Solaris 7_x86
Solaris 2.6
Solaris 2.6_x86
Solaris 2.5.1
108663-01
108660-01
108661-01
108658-02
Solaris 2.5.1_x86
108659-02
Solaris 2.5
108656-02
Solaris 2.5_x86
108657-02
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
60. IAVA0360 – 2003-A-0015 OpenSSL
Vulnerable Systems:
Any product using one of the following:
OpenSSL Project OpenSSL 0.9.6
OpenSSL Project OpenSSL 0.9.6 a
OpenSSL Project OpenSSL 0.9.6 b
OpenSSL Project OpenSSL 0.9.6 c
OpenSSL Project OpenSSL 0.9.6 d
OpenSSL Project OpenSSL 0.9.6 e
OpenSSL Project OpenSSL 0.9.6 g
OpenSSL Project OpenSSL 0.9.6 h
OpenSSL Project OpenSSL 0.9.6 i
OpenSSL Project OpenSSL 0.9.6 j
OpenSSL Project OpenSSL 0.9.7
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 379
OpenSSL Project OpenSSL 0.9.7 a
OpenSSL Project OpenSSL 0.9.7 b
OpenSSL Project OpenSSL 0.9.7 beta1
OpenSSL Project OpenSSL 0.9.7 beta2
OpenSSL Project OpenSSL 0.9.7 beta3
Compliance Checking:
Perform the following to determine the version:
# openssl version -v
# find / -name libssl.so.0.9.7
# find / -name libcrypt o .so.0.9.7
To resolve the OpenSSL vulnerabilities, upgrade to OpenSSL 0.9.7c or OpenSSL 0.9.6k. Alternatively, apply
a patch as directed by your vendor.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
61. IAVA0365 – 2003-T-0022 - JAVA RUNTIME and Virtual Machine
Vulnerable Systems:
SDK and JRE 1.4.1_03 and earlier
SDK and JRE 1.3.1_08 and earlier
SDK and JRE 1.2.2_015 and earlier
Compliance Checking:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 380
To tell what version of Java you are running, from the directory Java is loaded, run:
#
./java –version
Upgrade to the following versions:
SDK and JRE 1.4.1_04 and later
SDK and JRE 1.3.1_09 and later
SDK and JRE 1.2.2_016 and later
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
PDI:
IAVA0365V000412 Category III
1
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
G583
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Sun Java Virtual Machine Slash Path Security Model
Circumvention Vulnerability.
Reference:
IAVA 2003-T-0022
62. IAVA0370 – 2003-T-0024 - RSYNC DAEMON
Vulnerable Systems:
EnGarde
EnGarde Secure Linux 1.0.1
RedHat Linux 6.2.0
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 381
RedHat Linux 7.0.0
RedHat Linux 7.1.0
RedHat Linux 7.2.0
RedHat Linux 7.3.0
RedHat Linux 8.0.0
RedHat Linux 9.0.0
RedHat Fedora Core1
Caldera OpenLinux eBuilder 3.0.0
Caldera OpenLinux 2.3.0
Caldera OpenLinux 3.1.0 -IA64
Caldera OpenLinux Server 3.1.0
Caldera OpenLinux Workstation 3.1.0
Conectiva Linux ecommerce
Conectiva Linux graficas
Conectiva Linux 5.0.0
Conectiva Linux 5.1.0
Conectiva Linux 6.0.0
Conectiva Linux 7.0.0
Conectiva Linux 8.0.0
Conectiva Linux 9.0.0
SCO eDesktop 2.4.0
SCO eServer 2.3.1
S.u.S.E. Linux 6.4.0
S.u.S.E. Linux 7.0.0
S.u.S.E. Linux 7.1.0
S.u.S.E. Linux 7.2.0
S.u.S.E. Linux 7.3.0
S.u.S.E. Linux 8.0.0
S.u.S.E. Linux 8.1.0
S.u.S.E. Linux 8.2.0
S.u.S.E. Linux 9.0.0
Trustix Secure Linux 1.0.0 1
Trustix Secure Linux 1.1.0
Trustix Secure Linux 1.2.0
Trustix Secure Linux 1.5.0
HP Secure OS software for Linux 1.0.0
MandrakeSoft Corporate Server 1.0.1
MandrakeSoft Linux Mandrake 7.1.0
MandrakeSoft Linux Mandrake 7.2.0
MandrakeSoft Linux Mandrake 8.0.0
MandrakeSoft Linux Mandrake 8.1.0
MandrakeSoft Linux Mandrake 9.0.0
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 382
MandrakeSoft Linux Mandrake 9.1.0
MandrakeSoft Linux Mandrake 9.2.0
MandrakeSoft Single Network Firewall 7.2.0
MandrakeSoft Multi Network Firewall 8.2.0
MandrakeSoft Corporate Server 1.0.1
MandrakeSoft Corporate Server 2.1.0
Debian Linux 3.0.0
OpenBSD OpenBSD 3.0.0
OpenBSD OpenBSD 3.1.0
OpenBSD OpenBSD 3.2.0
OpenBSD OpenBSD 3.3.0
OpenBSD OpenBSD 3.4.0
OpenPKG OpenPKG Current
OpenPKG OpenPKG 1.2.0
OpenPKG OpenPKG 1.3.0
Slackware Linux 8.1.0
Slackware Linux 9.0.0
Slackware Linux 9.1.0
Compliance Checking:
First, determine if the system is running rsyncd by performing:
#
netstat –a | egrep “843|rsync”
If it is rsync is running on the system then:
# grep chroot /etc/rsyncd.conf
If it is not there, or it is set to no, this is a finding. Obtain patches from the vendor in accordance with the IAVA.
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 383
IAVA0370V000424 Category III
2
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G584
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
The rsync daemon is vulnerable to a heap memory overflow.
Reference:
IAVA 2003-T-0024
63. IAVA0375 – 2004-A-0002 - Check Point Firewall-1
Vulnerable Systems:
Check Point Software Firewall-1 4.1.0
Check Point Software Firewall-1 4.1.0 SP1
Check Point Software Firewall-1 4.1.0 SP2
Check Point Software Firewall-1 4.1.0 SP3
Check Point Software Firewall-1 4.1.0 SP4
Check Point Software Firewall-1 4.1.0 SP5
Check Point Software Firewall-1 4.1.0 SP6
Check Point Software Next Generation
Check Point Software Next Generation FP1
Check Point Software Next Generation FP2
Check Point Software Next Generation FP3
Check Point Software Next Generation FP3 HF1
Check Point Software Next Generation FP3 HF2
Check Point Software NG-AI
Check Point Software NG-AI R54
Check Point Software NG-AI R55
Check Point Software Firewall-1 4.1.0 SP5a
Check Point Software FireWall-1 Next Generation FP0
Check Point Software FireWall-1 Next Generation FP1
Check Point Software VPN-1 4.1.0
Check Point Software VPN-1 4.1.0 SP1
Check Point Software VPN-1 4.1.0 SP2
Check Point Software VPN-1 4.1.0 SP3
Check Point Software VPN-1 4.1.0 SP4
Check Point Software VPN-1 4.1.0 SP5
Check Point Software VPN-1 4.1.0 SP5a
Check Point Software VPN-1 Next Generation FP0
Check Point Software VPN-1 Next Generation FP1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 384
Compliance Checking:
To determine the version number of the Check Point that your are running, use the following command:
#
$FWDIR/bin/fw ver
where $FWDIR is the directory where Check Point is installed.
System Administrators who use the HTTP Security Servers of Check Point Firewall-1 must download and apply
the following update:
http://www.checkpoint.com/techsupport/downloads/bin/firewall1/security_server_hotfix_cpsc.zip
System Administrators who use VPN capabilities on VPN-1/FireWall-1 4.1 SP5a and prior, Next Generation FP0
and FP1 must upgrade to the latest non-vulnerable version provided below:
http://www.checkpoint.com/techsupport/ng_application_intelligence/r55_updates.html
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0375V000454 Category:I
6
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G585
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A vulnerable version of Check Point Firewall-1 is in use.
Reference:
IAVA 2004-A-0002
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 385
64. IAVA0380 – 2004-B-0002 - H.323 Protocol
Vulnerable Systems:
Debian GNU/Linux 3.0
Red Hat Linux 9
Check Point Software Firewall-1 4.0.0 SP1
Check Point Software Firewall-1 4.0.0 SP2
Check Point Software Firewall-1 4.0.0 SP3
Check Point Software Firewall-1 4.0.0 SP4
Check Point Software Firewall-1 4.0.0 SP5
Check Point Software Firewall-1 4.0.0 SP6
Check Point Software Firewall-1 4.0.0 SP7
Check Point Software Firewall-1 4.0.0 SP8
Check Point Software Firewall-1 4.1.0
Check Point Software Firewall-1 4.1.0 SP1
Check Point Software Firewall-1 4.1.0 SP2
Check Point Software Firewall-1 4.1.0 SP3
Check Point Software Firewall-1 4.1.0 SP4
Check Point Software Firewall-1 4.1.0 SP5
Check Point Software Firewall-1 4.1.0 SP6
Check Point Software Firewall-1 [VPN+DES+STRONG] 4.1.0 Build 41439
Check Point Software Firewall-1 [VPN+DES+STRONG] 4.1.0 SP2 Build 41716
Check Point Software Firewall-1 [VPN+DES] 4.1.0
Check Point Software Next Generation
Check Point Software Next Generation FP1
Check Point Software Next Generation FP2
Check Point Software Next Generation FP3
Check Point Software Next Generation FP3 HF1
Check Point Software Next Generation FP3 HF2
Check Point Software Next Generation with Application Intelligence
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Debian
pwlib1.2.5-5woody1
Redhat
pwlib-1.4.7-4.1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 386
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0380V000454 Category II
7
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G586
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A vulnerable version of the H.323 Protocol is in use.
Reference:
IAVA 2004-B-0002
65. IAVA0385 – 2004-A-0004 - ISS Real Secure
Vulnerable Systems:
RealSecure Network 7.0, XPU 22.11 and before
RealSecure Server Sensor 7.0 XPU 22.11 and before
Proventia A Series XPU 22.11 and before
Proventia G Series XPU 22.11 and before
Proventia M Series XPU 1.9 and before
RealSecure Desktop 7.0 ebl and before
RealSecure Desktop 3.6 ecf and before
RealSecure Guard 3.6 ecf and before
RealSecure Sentry 3.6 ecf and before
BlackICE Agent for Server 3.6 ecf and before
BlackICE PC Protection 3.6 ccf and before
BlackICE Server Protection 3.6 ccf and before
Running on the following Operating Systems:
Solaris 8
Solaris 9
RedHat Linux Professional
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 387
RedHat Enterprise
IBM AIX
Hewlett-Packard HP-UX
Compliance Checking:
Locate the issDaemon:
#
find / -name issDaemon –depth -print
#
./issDaemon –v
The daemon should be upgraded to the following non-vulnerable versions:
RealSecure Network 7.0, XPU 22.12
RealSecure Server Sensor 7.0 XPU 22.12
Proventia A Series XPU 22.12
Proventia G Series XPU 22.12
Proventia M Series XPU 1.10
RealSecure Desktop 7.0 ebm
RealSecure Desktop 3.6 ecg
RealSecure Guard 3.6 ecg
RealSecure Sentry 3.6 ecg
BlackICE Agent for Server 3.6 ecg
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0385V000455 Category:I
4
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G587
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
The ISS RealSecure protocol analysis module ICQ parsing routines
has a buffer overflow.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 388
Reference:
IAVA 2004-A-0004
66. IAVA0390 – 2004-T-0003 – Apache SSL Certificate Forging
Vulnerable Systems:
Apache-SSL 1.3.28+1.52 and earlier versions.
Compliance Checking:
To check the version:
#
httpd –v
The version should be at least 1.3.29+1.53.
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding..
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0390V000456 Category II
7
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
G588
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Detected an Apache-Secure Socket Layer Client Certificate
Forging Vulnerability.
Reference:
IAVA 2004-T-0003
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 389
67. IAVA0395 – 2004-T-0008 – TCPDUMP Buffer Overflows
Vulnerable Systems:
tcpdump
Apple
Caldera
Debian
EnGarde
FreeBSD
Mandrake
Redhat
SCO
SGI
SuSE
Trustix
Turbolinux
Compliance Checking:
To check the version of tcpdump on most systems:
#
tcpdump -–version
The version should be at least 3.8.3. If it is not, then upgrade both tcpdump to at least 3.8.3 and libpcap
to 0.8.3. Check the IAVA for specific vendor patches or upgrades.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 390
IAVA0395V000456 Category II
8
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G589
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
TCPDUMP has multiple buffer overflows and vulnerabilities from
malformed ISAKMP packets.
Reference:
IAVA 2004-T-0008
68. IAVA0400 – 2004-B-0005 – FreeBSD/Juniper Denial of Service
Vulnerable Systems:
FreeBSD 4.6.2
FreeBSD 4.7.0
FreeBSD 4.8.0
FreeBSD 4.9.0
FreeBSD 5.0.0
FreeBSD 5.1.0
FreeBSD 5.2.0
OpenBSD 3.3
OpenBSD 3.4
Compliance Checking:
Upgrade to the FreeBSD stable branch (4-STABLE) or to the RELENG_5_2, RELENG_4_9, or RELENG_
4_8 security branch or apply the applicable patch.
FreeBSD 4.8
tcp47.patch
FreeBSD 4.9
tcp47.patch
FreeBSD 5.2
tcp52.patch
OpenBSD 3.3
018_tcp.patch
OpenBSD 3.4
013_tcp.patch
Remediation Guidelines:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 391
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
PDI:
IAVA0400V000456 Category III
9
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G590
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There is a FreeBSD/Juniper BSD TCP out-of-sequence packets
denial of service.
Reference:
IAVA 2004-B-0005
69. IAVA0405 – 2004-T-0006 Solaris Password Utility
Vulnerable Systems:
Solaris 8.0
Solaris 8.0_x86
Solaris 9.0
Solaris 9.0_x86
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris 8.0
Solaris 8.0_x86
Solaris 9.0
Solaris 9.0_x86
108993-32 or later
108994-32 or later
113476-11 or later
114242-07 or later
Remediation Guidelines:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 392
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
PDI:
IAVA0405V000457 Category III
0
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G591
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Detected a vulnerable passwd utility on Solaris 5.8 or 5.9.
Reference:
IAVA 2004-T-0006
70. IAVA0410 – 2004-B-0006 OpenSSL Denial of Service
Vulnerable Systems:
Apple
Avaya
Check Point
Cisco
Citrix
FreeBSD
Hewlett Packard
NetScreen
Novell
OpenBSD
OpenSSL
OpenSSL Project OpenSSL 0.9.6
OpenSSL Project OpenSSL 0.9.6 c
Conectiva Linux 8.0.0
Debian Linux 3.0.0
MandrakeSoft Linux Mandrake 8.2.0
S.u.S.E. Linux 8.0.0
S.u.S.E. Linux 8.0.0 i386
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 393
OpenSSL Project OpenSSL 0.9.6 d
Slackware Linux 8.1.0
OpenSSL Project OpenSSL 0.9.6 e
FreeBSD 4.6.0
FreeBSD 4.6.0 -RELEASE
OpenSSL Project OpenSSL 0.9.6 f
OpenSSL Project OpenSSL 0.9.6 g
FreeBSD 4.7.0
FreeBSD 4.7.0 -RELEASE
HP Apache-Based Web Server 2.0.43 .00
HP Apache-Based Web Server 2.0.43 .04
HP Webmin-Based Admin 1.0.0 .01
Immunix OS 7+
NetBSD 1.6.0
OpenPKG 1.1.0
OpenSSL Project OpenSSL 0.9.6 h
OpenSSL Project OpenSSL 0.9.6 i
HP Apache-Based Web Server 1.3.27 .00
HP Apache-Based Web Server 1.3.27 .01
HP-UX Apache-Based Web Server 1.0.0 .01
HP-UX Apache-Based Web Server 1.0.0 .02.01
HP-UX Apache-Based Web Server 1.0.0 .03.01
HP-UX Apache-Based Web Server 1.0.0 .04.01
HP-UX Apache-Based Web Server 1.0.0 .05.01
HP-UX Apache-Based Web Server 1.0.0 .06.01
HP-UX Apache-Based Web Server 1.0.0 .06.02
HP-UX Apache-Based Web Server 1.0.0 .07.01
HP-UX Apache-Based Web Server 1.0.1 .01
MandrakeSoft Corporate Server 2.1.0
MandrakeSoft Corporate Server 2.1.0 x86_64
MandrakeSoft Linux Mandrake 9.0.0
MandrakeSoft Linux Mandrake 9.1.0
MandrakeSoft Linux Mandrake 9.1.0 ppc
S.u.S.E. Linux 8.2.0
OpenSSL Project OpenSSL 0.9.6 j
OpenSSL Project OpenSSL 0.9.6 k
BlueCoat Systems CacheOS CA/SA 4.1.10
BlueCoat Systems Security Gateway OS 2.0.0
BlueCoat Systems Security Gateway OS 2.1.9
BlueCoat Systems Security Gateway OS 2.1.5001 SP1
BlueCoat Systems Security Gateway OS 3.0.0
BlueCoat Systems Security Gateway OS 3.1.0
Slackware Linux 8.1.0
OpenSSL Project OpenSSL 0.9.7 Caldera OpenUnix 8.0.0
Caldera UnixWare 7.1.1
Caldera UnixWare 7.1.3
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 394
FreeBSD 5.0.0
Redhat Linux
RSA
SCO
SGI
Stonesoft
Tarantella
Compliance Checking:
All versions from 0.9.6c to 0.9.6l and versions 0.9.7a to 0.9.7c are affected. This vulnerability requires
multiple updates. Ensure OpenSSL libraries are, at least, 0.9.7d or 0.9.6m. Check for the correct version of
OpenSSL libraries by performing either, of these commands:
#
openssl version –v
#
ls –lLd /usr/lib/*ssl*
or
#
ls –lLd /usr/local/lib/*ssl*
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0410V000457 Category II
1
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G592
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Detected an OpenSSL denial-of-service-vulnerability.
Reference:
IAVA 2004-B-0006
71. IAVA0415 – 2004-B-0007 Linux JetAdmin Vulnerability
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 395
Vulnerable Systems:
Linux systems with:
HP Web Jetadmin 6.5.0 and prior
HP Web Jetadmin 7.0.0
Compliance Checking:
#
find / -name Jetadmin -o -name jetadmin
If found, execute the Jetadmin binary to display the version.
#
./jetadmin
To display the version.
If it is less than version 7.5, this is a finding. If it is 7.5 or higher, this is not a finding.
Remediation Guidelines:
Upgrade or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0415V000462 Category I
1
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G593
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Detected a vulnerable HP WEB JetAdmin version on Linux.
Reference:
IAVA 2004-B-0007
72. IAVA0420 – 2004-T-0014 CDE Remote Login
Vulnerable Systems:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 396
HP HP-UX 11.0.0
HP HP-UX 11.0.0 4
HP HP-UX 11.11.0
HP HP-UX 11.22.0
HP HP-UX 11.23.0
IBM AIX 4.3.3
IBM AIX 5.1.0
IBM AIX 5.2.0
SCO Unixware 7.1.1
SGI3
http://www .sgi.com/support/security/advisories.html
Solaris 7.0.0
Solaris 7.0.0 _x86
Sun Solaris 8.0.0
Sun Solaris 8.0.0 _x86
Sun Solaris 9.0.0
Sun Solaris 9.0.0 _x86
Sun Solaris 9.0.0 _x86 Update 2
Open Group CDE Common Desktop Environment 2.1.0 Sun Solaris 9
Sun Solaris 9 _x86
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Sun 7.0 107180-31
Sun 7.0_x86 107171-31
Sun 8.0 108919-21
Sun 8.0_x86 108920-21
Sun 9.0 112807-09
Sun 9.0_x86 114210-08
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 397
IAVA0420V000462 Category III
0
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
G594
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Detected A Common Desktop Environment DTLogin Remote
Double Free Vulnerability.
Reference:
IAVA 2004-T-00 14
73. IAVA0425 – 2003-B-0005 Sendmail Prescan Variant Vulnerability
Vulnerable Systems:
All systems with Sendmail.
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris 7.0
107684-11 or later
Solaris 7.0_x86
Solaris 8.0
107685-11 or later
110615-11 or later
Solaris 8.0_x86
110616-11 or later
Solaris 9.0
113575-05 or later
Solaris 9.0_x86
114137-04 or later
HPUX:
#
/usr/sbin/sendmail -d0.1 < /dev/null | grep -i version
The display will show the sendmail version number.
Download and install the appropriate file for the operating system revision and sendmail version.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 398
HP-UX B.11.00:
SMAIL-811.INETSVCS-SMAIL
InternetSrvcs.INETSVCS-RUN
Install sendmail.811.11.00.r4 file
Install sendmail.893.11.00.r4 file
HP-UX B.11.04:
InternetSrvcs.INETSVCS-RUN
Install sendmail.893.11.00.r4 file
HP-UX B.11.11:
SMAIL-811.INETSVCS-SMAIL
InternetSrvcs.INETSVCS-RUN
Install sendmail.811.11.11.r4 file
Install sendmail.893.11.11.r4 file
HP-UX B.11.22:
Install sendmail.811.11.22.r5 file
AIX 4.3.3
IY48659
AIX 5.1.0
IY48658
AIX 5.2.0
IY48657
Linux
ftp://updates.Red Hat.com/7.1/en/os/i386/sendmail-8.11.6-27.71.i386.rpm
ftp://updates.Red Hat.com/7.2/en/os/i386/sendmail-8.11.6-27.72.i386.rpm
ftp://updates.Red Hat.com/7.3/en/os/i386/sendmail-8.11.6-27.73.i386.rpm
ftp://updates.Red Hat.com/8.0/en/os/i386/sendmail-8.12.8-9.80.i386.rpm
ftp://updates.Red Hat.com/9/en/os/i386/sendmail-8.12.8-9.90.i386.rpm
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 399
IAVA0425V000471 Category II
6
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G595
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Detected A Sendmail Prescan Variant Remote Buffer Overrun
Vulnerability.
Reference:
IAVA 2003-B-0005
74. IAVA0430 – 2004-T-0016 Solaris Management Console Vulnerability
Vulnerable Systems:
Sun Solaris 8
Sun Solaris 8 _x86
Sun Solaris 9
Sun Solaris 9 _x86
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Sun Solaris 8
Sun Solaris 8 _x86
Sun Solaris 9
Sun Solaris 9 _x86
111313-02 or later
111314-02 or later
116807-01 or later
116808-01 or later
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
PDI:
IAVA0430V000471 Category III
7
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G596
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 400
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Detected A Sun Solaris Management Console Information
Disclosure Vulnerability.
Reference:
IAVA 2004-T-0016
75. IAVA0435 – 2004-T-0017 MIT Kerberos Multiple Vulnerabilities
Vulnerable Systems:
All releases of MIT Kerberos 5, up to and including krb5-1.3.3.
Conectiva Linux 8.0.0
Debian Linux 3.0.0
Debian Linux 3.0.0 alpha
Debian Linux 3.0.0 arm
Debian Linux 3.0.0 hppa
Debian Linux 3.0.0 ia-32
Debian Linux 3.0.0 ia-64
Debian Linux 3.0.0 m68k
Debian Linux 3.0.0 mips
Debian Linux 3.0.0 mipsel
Debian Linux 3.0.0 ppc
Debian Linux 3.0.0 s/390
Debian Linux 3.0.0 sparc
MandrakeSoft Linux Mandrake 8.1.0
MandrakeSoft Linux Mandrake 8.1.0 ia64
MandrakeSoft Linux Mandrake 8.2.0
MandrakeSoft Linux Mandrake 8.2.0 ppc
MandrakeSoft Multi Network Firewall 8.2.0
MandrakeSoft Corporate Server 2.1.0
MandrakeSoft Linux Mandrake 9.0.0
MandrakeSoft Linux Mandrake 9.1.0
MandrakeSoft Linux Mandrake 9.1.0 ppc
OpenBSD OpenBSD 3.1.0
OpenBSD OpenBSD 3.2.0
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 401
RedHat Linux 6.2.0
RedHat Linux 6.2.0 alpha
RedHat Linux 6.2.0 i386
RedHat Linux 6.2.0 sparc
RedHat Linux 7.0.0
RedHat Linux 7.0.0 alpha
RedHat Linux 7.0.0 i386
RedHat Linux 7.1.0
RedHat Linux 7.1.0 alpha
RedHat Linux 7.1.0 i386
RedHat Linux 7.1.0 ia64
RedHat Linux 7.2.0
RedHat Linux 7.2.0 i386
RedHat Linux 7.2.0 ia64
RedHat Linux 7.3.0
RedHat Linux 7.3.0 i386
RedHat Linux 8.0.0
RedHat Linux 8.0.0 i386
RedHat Linux 9.0.0 i386
SGI ProPack 3.0.0
Sun SEAM 1.0.0
Sun Solaris 2.6.0
Sun Solaris 2.6.0 _x86
Sun Solaris 7.0.0
Sun Solaris 7.0.0 _x86
Sun SEAM 1.0.1
Sun Solaris 8.0.0
Sun Solaris 8.0.0 _x86
Sun SEAM 1.0.2
Sun Solaris 9.0.0
Sun Solaris 8.0.0
Sun Solaris 8.0.0 _x86
Sun Solaris 9.0.0
Sun Solaris 9.0.0 _x86
MIT Kerberos 5 5.0.0 -1.3.3
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 402
Solaris 5.7
112536-05
Solaris 5.7_x86
112537-05
Solaris 5.8
112237-11 and 112390-09
Solaris 5.8_x86
112240-08 and 112238-19
Solaris 5.9
112908-15
Solaris 5.9_x86
115168-05
Redhat
# rpm –qa | grep krb5-workstation
The version in the second field should be at least 1.3.3-7.
Debian
Upgrade to at least kerberos version 5, release 1.2.4-5 or 1.3.3-2
Mandrake
Upgrade to at least Kerberos version 5, release 1.3.3-4
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
PDI:
IAVA0435V000471 Category III
8
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G597
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Detected a MIT Kerberos multiple buffer overrun vulnerability.
Reference:
IAVA 2004-T-0017
76. IAVA0440 – 2004-T-0018 Multiple Vulnerabilities in ISC DHCP 3
Vulnerable Systems:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 403
ISC DHCPD 3.0.1 rc12
ISC DHCPD 3.0.1 rc13
RedHat Fedora Core2
S.u.S.E. Linux 8.0.0
S.u.S.E. Linux 8.0.0 i386
S.u.S.E. Linux 8.1.0
S.u.S.E. Linux 8.2.0
S.u.S.E. Linux 9.0.0
S.u.S.E. Linux 9.0.0 x86_64
S.u.S.E. Linux 9.1.0
S.u.S.E. Linux Admin-CD for Firewall
S.u.S.E. Linux Connectivity Server
S.u.S.E. Linux Database Server
S.u.S.E. Linux Enterprise Server 7
S.u.S.E. Linux Enterprise Server 8
S.u.S.E. Linux Firewall on CD
S.u.S.E. Linux Office Server
S.u.S.E. SuSE eMail Server III
Compliance Checking:
Solaris
The dhcpd binary should be:
/usr/lib/inet/in.dhcpd
# strings <dhcpd_binary> | grep "Internet Software Consortium”
HP-UX
The dhcpd binary should be: /usr/lbin/dhcpserverd
# strings <dhcpd_binary> | grep "Internet Software Consortium”
AIX
The dhcpd binary should be: /usr/sbin/dhcpsd
# strings <dhcpd_binary> | grep "Internet Software Consortium”
IRIX
The dhcpd binary should be: /usr/sbin/dhcpd
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 404
# strings <dhcpd_binary> | grep "Internet Software Consortium”
Linux
The dhcpd binary should be: /usr/sbin/dhcpd
# strings <dhcpd_binary> | grep "Internet Software Consortium”
If the string "Internet Software Consortium ” is found, confirm the version is 3.0.1 rc14 or later.
# <dhcpd_binary> | more
Remediation Guidelines:
Upgrade to, at the least, the required software release or remove the binary/application to remediate this
finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT III finding may be downgraded to a CAT IV.
PDI:
IAVA0440V000471 Category III
9
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G598
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Detected Vulnerabilities in The ISC version of DHCP 3.
Reference:
IAVA 2004-T-0018
77. IAVA0445 – 2004-T-0032 Vulnerabilities in Apache Web Server
Vulnerable Systems:
Apache 2.0.51 and prior versions
Apache 1.3.31 and prior versions
Compliance Checking:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 405
Confirm the version is 2.0.52 or later, or 1.3.33 or later, respectively.
# <httpd> -v
Or
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris 5.8
Solaris 5.8_x86
Solaris 5.9
Solaris 5.9_x86
116973-01
116974-01
113146-05
114145-04
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0445V000501 Category I
4
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
G599
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are multiple vulnerabilities in the Apache Web server.
Reference:
IAVA 2004-T-0032
78. IAVA0455 –2000-B-0005 Input Validation Problem in rpc.statd
Vulnerable Systems:
Debian 2.2
Redhat 6.x
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 406
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Debian
nfs-common_0.1.9.1-1.deb
Redhat
nfs-utils-0.1.9.1-1.i386.rpm
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0455V000100 Category I
4
:
MAC/Confidentiality Levels:
Status Code: MAN++ Previously:
L010
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A Linux system has the input validation problem in rpc.statd.
Reference:
IAVA 2000-B-0005
79. IAVA0460 – 2001-A-0002 IRIX Telnet
Vulnerable Systems:
IRIX versions 3.x through 6.5.9
Compliance Checking:
To check the version:
# uname –R
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 407
Or
Perform procedures in Appendix F, Patch Control, to check for the following patches:
IRIX 3.x through 6.4 (except 6.2) Upgrade to IRIX 6.5.10 or higher
IRIX 6.2 apply patch #4050 or upgrade to 6.5.10
IRIX 6.5 through 6.5.9 apply patch #4060 or upgrade to 6.5.10
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0460V000099 Category II
9
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
SG01
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
IRIX telnetd is vulnerable.
Reference:
IAVA 2001-A-0002
80. IAVA0465 – 1999-B-0002 SGI Array Services
Vulnerable Systems:
IRIX
Compliance Checking:
# grep AUTHENTICATION /usr/lib/array/arrayd.auth
Confirm AUTHENTICATION NONE is commented out.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 408
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT II finding may be downgraded to a CAT III.
PDI:
IAVA0465V000100 Category II
0
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
SG03
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
SGI array services has the default configuration vulnerability.
Reference:
IAVA 1999-B-0002
81.
IAVA0470 – 1998-A-0010 SGI Buffer Overflow Vulnerability
Vulnerable Systems:
IRIX 3.x
IRIX 4.x
IRIX 5.0.x
IRIX 5.1.x
IRIX 5.2
IRIX 5.3
IRIX 6.0.x
IRIX 6.1
IRIX 6.2
IRIX 6.3
IRIX 6.4
IRIX 6.5
Compliance Checking:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 409
Execute: versions –IM | grep patch#
For xlock:
Patch
5.3
2090
6.2
2090
6.3
2090
6.4
2091
5.3
3463
6.2
3289
For df:
6.3
3722
6.4
3883
For pset:
3. 2176
6.2
3704
6.3
2792
For eject:
3. 3191
6.2
3722
6.4
3883
For login:
5.3
2216
6.1
1010
6.2
2181
6.3
3183
For ordist:
5.3
6.2-6.4
2212
2213
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 410
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0470V000100 Category:I
1
MAC/Confidentiality Levels:
Status Code: PART
Previously:
SG05
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
SGI buffer overflow vulnerabilities exist.
Reference:
IAVA 1998-A-0010
82. IAVA0475 – 1999-A-0006 Statd and Automountd
Vulnerable Systems:
For rpc.statd:
Solaris 5.5.1
Solaris 5.5.1_x86
Solaris 5.6
Solaris 5.6_x86
For automountd:
Solaris 5.5.1
Solaris 5.5.1_x86
Compliance Checking:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 411
Perform procedures in Appendix F, Patch Control, to check for the following patches:
For rpc.statd:
Solaris 5.5.1
104166-05
Solaris 5.5.1_x86
104167-05
Solaris 5.6
106592-04
Solaris 5.6_x86
106593-04
For automountd:
Solaris 5.5.1
Solaris 5.5.1_x86
104654-05
104655-05
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0475V000100 Category I
3
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
SO25
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A Solaris system has statd and automountd vulnerabilities.
Reference:
IAVA 1999-A-0006
83. IAVA0485 – 2001-T-0002 IRDP
Vulnerable Systems:
Solaris 5.5.1
Solaris 5.5.1_x86
Solaris 5.6
Solaris 5.6_x86
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 412
Solaris 5.7
Solaris 5.7_x86
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris 5.5.1
Solaris 5.5.1_x86
Solaris 5.6
Solaris 5.6_x86
Solaris 5.7
Solaris 5.7_x86
109721-01
109722-01
109719-01
109720-01
109709-01
109710-01
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0485V000106 Category I
5
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
SO27
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A Solaris system has a vulnerable version of ARP.
Reference:
IAVA 2001-T-0002
84. IAVA0490 – 2001-A-0003 SNMP to DMI Mapper Daemon
Vulnerable Systems:
Solaris 5.7
Solaris 5.7_x86
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 413
Solaris 5.8
Solaris 5.8_x86
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris 5.7
Solaris 5.7_x86
107709-19
107710-19
Solaris 5.8
108869-17
Solaris 5.8_x86
108870-17
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0490V000106 Category:I
6
MAC/Confidentiality Levels:
Status Code: PART
Previously:
SO28
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A Solaris system has a SNMP to DMI mapper daemon
(snmpXdmid) vulnerability.
Reference:
IAVA 2001-A-0003
85. IAVA0495 – 2001-T-007 Solaris Line Printer Daemon
Vulnerable Systems:
Solaris 5.6
Solaris 5.6_x86
Solaris 5.7
Solaris 5.7_x86
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 414
Solaris 5.8
Solaris 5.8_x86
Compliance Checking:
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris 5.6
Solaris 5.6_x86
106235-10
106236-10
Solaris 5.7
Solaris 5.7_x86
Solaris 5.8
Solaris 5.8_x86
107115-10
107116-10
109320-05
109321-05
Remediation Guidelines:
Apply the applicable patch or remove the binary/application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0495V000106 Category I
8
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
SO29
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
The Solaris line printer daemon (in.lpd) is vulnerable to a buffer
overflow.
Reference:
IAVA 2001-T-0007
86. IAVA0500 – 2000-B-0003 KDC Vulnerablity
Vulnerable Systems:
MIT Kerberos 5 releases krb5-1.0.x, krb5-1.1, krb5-1.1.1
MIT Kerberos 4 patch 10, and likely earlier releases as well
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 415
KerbNet (Cygnus implementation of Kerberos 5)
Cygnus Network Security (CNS -- Cygnus implementation of
Kerberos 4)
Compliance Checking:
Use the command:
#
find /etc –name krb5.conf
to look for the presence of a Kerberos 5 configuration file on the system. If the file is found, look for the
presence of the default domain and v4_instance_convert configuration variables in the [realms]
section of the file. If these two variables are present and configured then this is a finding as Kerberos is working
in Version IV compatibility mode. If /etc/krb4.conf exists this is also a finding without the applied
patches. Upgrade to version 5-1.0.X and apply the patch provided by MIT. Only the patches for the krb_rd_req()
vulnerability need to be applied to version 4 to address the issues described in this advisory.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0500V000470 Category II
4
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
V064
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A system has a vulnerable version of KDC.
Reference:
IAVA 2000-B-0003
87. IAVA0510 – 1999-A-0003 FTP RNFR Command Vulnerability
Vulnerable Systems:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
ProFTPD
wu-ftpd
Page 416
1.2.Oprel
All versions prior to 2.4.2
Compliance Checking:
Confirm the version is 1.2.Opre2or later, or 2.4.2 or later, respectively.
# /usr/ccs/bin/what <ftp_daemon>
Or
# strings <ftp_daemon>
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0510V000469 Category:I
9
MAC/Confidentiality Levels:
Status Code: PART
Previously:
V324
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A BSD system has the FTP RNFR command vulnerability.
Reference:
IAVA 1999-A-0003
88. IAVA0515 – 1999-B-0003, 2000-B-0004, 2001-B-0004 WU-FTPd
Vulnerable Systems:
wu-ftpd
2.6.0 or earlier
Compliance Checking:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 417
Confirm the version is 2.6.1 or later, respectively.
# /usr/ccs/bin/what <ftp_daemon>
Or
# strings <ftp_daemon>
If all patches have been applied to the 2.6.0 version, it is not a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0515V000470 Category I
0
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
V3375
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
A server is running a vulnerable version of wu-ftpd.
Reference:
IAVA 1999-B-0003, 2000-B-0004, 2001-B-0004
89. IAVA0520 – 2006-A-0013 Sendmail remote execution vulnerability.
Vulnerable Systems:
Sendmail prior to 8.13.6
Compliance Checking:
Within certain operating system architectures, a remote attacker may be able to force certain timing conditions
that would allow execution of arbitrary code or commands on a vulnerable system. Systems running an MTA are
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 418
typically deployed in the DMZ as a gateway for delivering inbound and outbound email, though they may also be
used for internal email delivery between systems or applications.. A system is vulnerable to this IAVA if the
sendmail version is less than 8.13.6 or does not contain up-to-date patches. To check for the vulnerability check
the version of sendmail the system is running. There are two easy methods: 1. Perform the following command;
telnet hostname 25. That connects to the sendmail server port and the server usually tells its version. Since we
tell everybody to hide the version, though, the alternate is the following command; cd to the sendmail binary
directory, usually /usr/lib , and execute echo \$Z | sendmail -bt -d0 . Sendmail will return some extraneous
information including the version number, i.e., Version 8.13.6. Obtain the latest version of sendmail. The
acceptable version to answer this IAVA is 8.13.6, or higher or a version patched to fix the vulnerability.
Solaris
5.8_x86
110616-14
5.8
110615-14
5.9_x86
5.9
5.10_x86
5.10
114137-05
113575-06
122857-01
122856-01
HPUX
AIX
IRIX
B.11.00
sendmail-811_01.006.depot
B.11.11
sendmail-8.13_1111.depot
B.11.23
sendmail-8.13_1123.depot
5.1.0
IY82992
5.2.0
IY82993
5.3.0
IY82994
6.5
patch 7082
Linux
Redhat
SuSe
sendmail-8.12.11-4
sendmail-8.13.3-5.3
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 419
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0520V001173 Category I
7
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There is a sendmail remote execution vulnerability
Reference:
IAVA 2006-A-0013
90. IAVA0530 – 2006-A-0007 Oracle E-Business Suite Vulnerabilities
Vulnerable Systems:
Oracle E-Business Suite Release 11i, versions 11.5.1 through 11.5.10 CU2
Oracle E-Business Suite Release 11.0
Compliance Checking:
Check for compliance by using the Oracle Installer, the GUI interface for installation. The patches listed are
spot checks for multiple-patch requirements based on version and platform. Please note whether each check is
for one of a group or requires two or more specific patches to complete the spot check.
Switch user to an account used for Oracle installations. This will ensure the environment variables are set
correctly.
Start the Oracle Installer with the command:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 420
# $ORACLE_HOME/bin/runInstaller
When the Welcome screen displays, click on the Installed Products button at the bottom of the screen. Expand
each Oracle Home. If Oracle E-Business Suite is listed, then expand it to view any installed patches.
Please ensure all of the patches listed for the installed version are installed;
11.5.10 CU2: 4865928, 4756429
11.5.10: 4333555, 4756429
11.5.9: 4666822, 4710802. 3453273, 3428504, 4756429, 4690594
11.5.8 through 11.5.4: 4746210. 3453273, 4756429, 4690594
11.5.3 and 11.5.2: 4746210. 4756429, 4690594
11.5.1: 4746210. 4690594
11.5.0: none
Note: Repeat for each Oracle installation.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0530V000758 Category I
7
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
G566
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are multiple vulnerabilities in Oracle E-Business Suite and
Applications.
Reference:
IAVA 2006-A-0007
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 421
91. IAVA0545 – 2005-B-0019 Vulnerabilities in IKE Packet Processing
Vulnerable Systems:
Solaris 5.9
Solaris 5.9_x86
Solaris 10
Solaris 10_x86
HP-UX B.11.00 IPSec.IPSEC2-KRN
HP-UX B.11.11 IPSec.IPSEC2-KRN
HP-UX B.11.11 IPSec.IPSEC2-KRN,revision=A.02.00
HP-UX B.11.23 IPSec.IPSEC2-KRN
Compliance Checking:
Solaris
Perform procedures in Appendix F, Patch Control, to check for the following patches:
Solaris 5.9
113451-10
Solaris 5.9_x86
114435-09
Solaris 10
118371-06
Solaris 10_x86
118372-06
HPUX
To determine if an HP-UX system has an affected version, search the command output for one of the filesets
listed below.
# swlist -a revision -l fileset
B.11.00 IPSec.IPSEC2-KRN
install revision A.01.05.01 or subsequent
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 422
B.11.11 IPSec.IPSEC2-KRN
install revision A.01.07.02 or subsequent
B.11.11 IPSec.IPSEC2-KRN,revision=A.02.00
install revision A.02.01 or subsequent
B.11.23 IPSec.IPSEC2-KRN
install revision A.02.01 or subsequent
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0545V000759 Category:I
0
MAC/Confidentiality Levels:
Status Code: PART
Previously:
G571
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are vulnerabilities in IKE Packet Processing.
Reference:
IAVA 2005-B-0019
92. IAVA0550 – 2006-A-0011 Vulnerabilities in Oracle E-Business Suite
Vulnerable Systems:
Oracle Diagnostics, versions 2.3 and lower *
* Available only on:
Oracle E-Business Suite Release 11i, versions 11.5.4 and higher
Compliance Checking:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 423
Check for compliance by using the Oracle Installer, the GUI interface for installation. The patches listed are
spot checks for multiple-patch requirements based on version and platform. Please note whether each check is
for one of a group or requires two or more specific patches to complete the spot check.
Switch user to an account used for Oracle installations. This will ensure the environment variables are set
correctly.
Start the Oracle Installer with the command:
$ORACLE_HOME/bin/runInstaller
When the Welcome screen displays, click on the Installed Products button at the bottom of the screen. Expand
each Oracle Home. If Oracle E-Business Suite is listed, then expand it to discover any entry for Oracle
Diagnostics. If listed, search for any entry indicating the Oracle Diagnostics 2.3 Rollup Patch (RUP) A is
installed.
Note: Repeat for each Oracle Diagnostics installation.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0550V000759 Category I
1
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
G572
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are vulnerabilities in Oracle E-Business Suite.
Reference:
IAVA 2006-A-0011
93. IAVA0555 – 2006-A-0020 Vulnerabilities in Oracle E-Business Suite
Vulnerable Systems:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 424
Oracle E-Business Suite 11.0.0
Oracle E-Business Suite 11i 11.5.1
Oracle E-Business Suite 11i 11.5.10
Oracle E-Business Suite 11i 11.5.10 CU2
Oracle E-Business Suite 11i 11.5.2
Oracle E-Business Suite 11i 11.5.3
Oracle E-Business Suite 11i 11.5.4
Oracle E-Business Suite 11i 11.5.5
Oracle E-Business Suite 11i 11.5.6
Oracle E-Business Suite 11i 11.5.7
Oracle E-Business Suite 11i 11.5.8
Oracle E-Business Suite 11i 11.5.9
Compliance Checking:
The Oracle OPatch utility may also be used to review installed versions and patches. Have the Oracle DBA run
the OPatch utility and send the text output to a file for the reviewer to use. The utility may be installed anywhere
on the system.
Check for compliance by using the Oracle Installer, the GUI interface for
installation. Please note that some checks for minor components are not included.
On Windows the command is %ORACLE_HOME%\bin\setup.exe or it can be run
from the Start>Programs>Oracle Installation Products>Universal Installer
or Start>Programs>Oracle-%ORACLE_HOME_NAME%>Oracle Installation
Prodcuts>Universal Installer.
On the Welcome screen, click on the Installed Products button at the
bottom of the screen. Expand each Oracle Home. Expand the Oneoffs
selection and view the installed patches. If required patches listed are not listed
or the Oneoffs selection is not there, then this is a Finding.
Apply all patches listed for the E-Business version listed:
11.5.10 CU2: 4150288, 5077660, 4969592, 4332440, 5074725, 5021981, 4712852
11.5.10 and CU1: 4150288, 5077660, 4969592, 4332440, 5021850, 5074725, 5021981, 4712852
11.5.9: 4150288, 5083114, 4969592, 4970474, 3483921, 5074725, 5021981, 4712852
11.5.8: 4150288, 2665762, 4969592, 5074725, 5021981, 5083111, 4712852
11..5.4 through 11.5.7: 4150288, 4969592, 5074725, 5021981, 4712852
11.5.1, 11.5.2, and 11.5.3: 4969592, 5074725, 5021981, 4712852
11.5.0: none
11.0: 4970432
Remediation Guidelines:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 425
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0555V001174 Category I
8
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
There are multiple vulnerabilities in E Business Suite.
Reference:
IAVA 2006-A-0020
94. IAVA0570 – 2006-A-0032 Multiple Vulnerabilities in Oracle E-Business Suite
Vulnerable Systems:
All versions.
Compliance Checking:
(The Oracle OPatch utility may also be used to review installed versions and patches. Have the Oracle DBA run
the OPatch utility and send the text output to a file for the reviewer to use. The text file may be searched for the
required patch numbers listed below. The utility may be installed anywhere on the system. )
Check for compliance by using the Oracle Installer, the GUI interface for
installation. Please note that some checks for minor components are not included.
On the Welcome screen, click on the Installed Products button at the
bottom of the screen. Expand each Oracle Home. Expand the Oneoffs
selection and view the installed patches. If required patches listed are not listed
or the Oneoffs selection is not there, then this is a Finding.
Apply all patches listed for the E-Business version listed:
11.5.10 CU2: 5083302, 5088058, 4380242, 5127737, 5161758, 5183582
11.5.10 and CU1: 5083302, 5088058, 4380242, 5127737, 5161758, 5183582
11.5.7 thru 11.5.9: 4068388, 4359261, 4380242, 5183582
If Oracle Financials is installed, one of the following patches must be applied if the
instance is NOT at level 11i.FIN_PF.D thru 11i.FIN_PF.G:
4155556, 4058603, 4317421, 4317421
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 426
Versions earlier than 11.5.7 are no longer supported.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0570
V0012321
Category I
:
Status Code: MAN
Previously:
N/A
MAC/Confidentiality Levels: MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Multiple Vulnerabilities in Oracle E-Business Suite
Reference:
IAVA 2006-A-00 32
95. IAVA0590 – 2006-T-0020 Mozilla Firefox/Thunderbird Vulnerabilities
Vulnerable Systems:
Firefox versions prior to 1.5.0.6
Thunderbird versions prior to 1.5.0.5
SeaMonkey versions prior to 1.0.4
Compliance Checking:
Perform the following to check the Firefox version:
# ./firefox –v
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 427
If the version is not at least 1.5.0.6, then this is a finding.
Perform the following to check the Thunderbird version:
# ./thunderbird –v
If the version is not at least 1.5.0.5 then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0590V001249 Category I
7
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Mozilla Firefox/Thunderbird Vulnerabilities
Reference:
IAVA 2006-T-0020
96. IAVA0595 – 2006-T-0016 Sun Java Application Server Vulnerabilities
Vulnerable Systems:
SPARC Platform
Sun ONE Application Server 7 without Update 9
Sun Java System Application Server 7 2004Q2 without Update 5
Sun Java System Applciation Server Enterprise Edition 8.1 2005 Q1 without (file-based) patch 119169-08
or (SVR4) patch 119166-16
x86 Platform
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 428
Sun ONE Application Server 7 without Update 9
Sun Java System Application Server 7 2004Q2 without Update 5
Sun Java System Application Server Enterprise Edition 8.1 2005 Q1 without (file based) patch 119170-08
or (SVR4) patch 119167-16
Linux Platform
Sun ONE Application Server 7 without Update 9
Sun Java System Application Server 7 2004Q2 without Update 5
Sun Java System Application Server Enterprise Edition 8.1 2005 Q1 without (file based) patch 119171-08
or RHEL2.1/RHEL3.0 (Pkg_patch) 119168-16
Compliance Checking:
To determine the version of Sun Java System Application server on a system, the following command can be run:
# <AS_INSTALL>/bin/asadmin version –verbose
If the version is one of those listed in the vulnerable systems, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0595V001205 Category II
5
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Sun Java Application Server Vulnerabilities
Reference:
IAVA 2006-T-0016
97. IAVA0600 – 1998-0011 General Internet Message Access Protocol (IMAP) and Post
Office Protocol (POP) Vulnerabilities
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 429
Vulnerable Systems:
All platforms running IMAP or POP servers
Compliance Checking:
Perform the following to determine if the IMAP or POP is installed and listening:
# netstat –a |grep LISTEN
If port 110 or port 143 are shown, then the mail servers are enabled. If the mail servers are enabled and are not
a required service, then this is a finding. If the service is required and SSL is not being utilized, then this is also
a finding. Ask the SA if SSL is being utilized with the mail server connections.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0600V000574 Category I
8
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
General Internet Message Access Protocol (IMAP) and Post Office
Protocol (POP) Vulnerabilities
Reference:
IAVA 1998-0011
98. IAVA0605 – 1999-0001 Mountd Remote Buffer Overflow Vulnerability
Vulnerable Systems:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 430
Legacy versions of Red Hat Linux
Caldera
Compliance Checking:
Check the nfs server version by executing the following:
# rpm –qa |grep nfs-server
If the version displayed is not at least 2.2, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0605V000574 Category I
9
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Mountd Remote Buffer Overflow Vulnerability
Reference:
IAVA 1999-0001
99. IAVA0610 – 1999-0003 Remote FTP Vulnerability
Vulnerable Systems:
UNIX systems running the WU-FTPD daemon or its
derivatives.
Compliance Checking:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 431
To determine the version of ftpd, issue the following command:
# strings /usr/sbin/in.ftpd | grep –I version
The version must be 2.6.0, or later, or this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0610V000575 Category I
1
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Remote FTP Vulnerability
Reference:
IAVA 1999-0003
100. IAVA0615 – 2000-T-0015 BMC Best/1 Version 6.3 Performance Management System
Vulnerability
Vulnerable Systems:
BMC Best/1 Version 6.3 Performance Management System
Compliance Checking:
Ask the system administrator if the BMC Best/1 product is installed on the system. If the product is installed and
less than version 6.5, then this is a finding.
Remediation Guidelines:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 432
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0615V000579 Category II
8
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
BMC Best/1 Version 6.3 Performance Management System
Vulnerability
Reference:
IAVA 2000-T-0015
101. IAVA0620 – 2000-B-0001 BIND NXT Buffer Overflow
Vulnerable Systems:
BIND v8.2.1
Compliance Checking:
Perform the following to determine the version of BIND.
# named –v
Or
# what /usr/sbin/named -v
If the version of BIND is not greater than 8.2.1, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 433
IAVA0620V000578 Category I
0
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Bind NXT Buffer Overflow
Reference:
IAVA 2000-B-0001
102. IAVA0625 – 2000-B-0002 Netscape Navigator Improperly Validates SSL Sessions
Vulnerable Systems:
Netscape Navigator prior to version 4.72
Compliance Checking:
If a Netscape browser is installed, check the browser version by opening the browser application and selecting
Help/About Netscape to obtain the version. If the version is not at least 4.73, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0625V000578 Category I
1
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Netscape Navigator Improperly Validates SSL Sessions
Reference:
IAVA 2000-B-0002
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 434
103. IAVA0630 – 2000-A-0001 Cross-Site Scripting Vulnerability
Vulnerable Systems:
All web servers and browsers
Compliance Checking:
If a web browser is installed, view the advanced options and ensure to disable any scripting such as javascript.
Web server software such as Apache and the Sun Java web server and associated web pages should be reviewed
for dynamic content that may become vulnerable to malicious scripting by the web server administrator and web
site developers.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0630V000577 Category I
7
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Cross-Site Scripting Vulnerability
Reference:
IAVA 2000-A-0001
104. IAVA0635 – 2001-B-0003 U Encoding Intrusion Detection System Bypass Vulnerability
Vulnerable Systems:
Snort prior to 1.8.1
Compliance Checking:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 435
To determine the version of snort, issue the following command:
# snort -V
If the version of snort is not at least 1.8.1, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0635V000581 Category I
1
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
U Encoding Intrusion Detection System Bypass Vulnerability
Reference:
IAVA 2001-B-0003
105. IAVA0640 – 2002-T-0005 Multiple Vulnerabilities in Oracle Database Server
Vulnerable Systems:
Oracle9i Database Server
Oracle8i Database Server
Oracle8 Database Server
Compliance Checking:
Check that the Oracle9i Database Server has had the patches applied. To check for patches, execute the
following: %ORACLE_HOME%\bin\setup.exe On the Welcome screen, click on the Installed Products button at
the bottom of the screen. Expand each Oracle Home. Expand the Oneoffs selection and view the installed
patches. If patches listed are not there or the Oneoffs selection is not there, then this is a Finding. Version 9.2.0.3
– patch 3056404 Version 9.2.0.3 – patch 2973634 .
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 436
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0640V000585 Category II
2
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Multiple Vulnerabilities in Oracle Database Server
Reference:
IAVA 2002-T-0005
106. IAVA0645 – 2002-T-0006 Multiple Vulnerabilities in Oracle9i Application Server
Vulnerable Systems:
Oracle9i Application Server
Compliance Checking:
Check that the Oracle9i Application Server has had the patches applied. To check for patches, execute the
following: %ORACLE_HOME%\bin\setup.exe On the Welcome screen, click on the Installed Products button at
the bottom of the screen. Expand each Oracle Home. Expand the Oneoffs selection and view the installed
patches. If patches listed are not there or the Oneoffs selection is not there, then this is a Finding. Version 1.2.0.x
– Patch 2128936, 2209455
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 437
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0645V000585 Category II
3
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Multiple Vulnerabilities in Oracle9i Application Server
Reference:
IAVA 2002-T-0006
107. IAVA0650 – 2002-T-0010 Denial of Service Vulnerability in ISC-BIND 9
Vulnerable Systems:
ISC BIND 9.0 through 9.2
Compliance Checking:
Execute the following command to check the version of BIND.
# /usr/sbin/named –v
If the version output of the preceeding command is not at least 9.2.1, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0650V000585 Category II
7
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 438
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Denial of Service Vulnerability in ISC-BIND 9
Reference:
IAVA 2002-T-0010
108. IAVA0655 – 2002-T-SNMP-003 Multiple Simple Network Management Protocol
Vulnerabilities in Servers and Applications
Vulnerable Systems:
Ncipher Nfast800 NET-SNMP for Linux/Solaris
Compliance Checking:
Ask the systems administrator if the ncipher product is installed. If the product is installed, ask the
systems administrator to verify the patches have been downloaded and installed from : http://www.ncipher.com/
members/download.php?resource_id=55 . If the system administrator does not have a login to the above website,
then this is a good indication that the product has not been patched. If the product has been installed and patched
properly, then this is not a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0655V000586 Category II
7
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Multiple Simple Network Management Protocol Vulnerabilities in
Servers and Applications
Reference:
IAVA 2002-T-SNMP-003
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 439
109. IAVA0660 – 2002-A-SNMP-004 Multiple Simple Network Management Protocol
Vulnerabilities in Perimeter Devices
Vulnerable Systems:
DNCP-HPUX
Compliance Checking:
DNCP( Distributed Network Control Platform) manufactures edge devices utilizing the HP-UX operating
systems. Check this device for the following patch with the procedures listed in Appendix F.
PHSS_26138
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0660V000583 Category I
8
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Multiple Simple Network Management Protocol Vulnerabilities in
Perimeter Devices
Reference:
IAVA 2002- A-SNMP-004
110. IAVA0665 – 2002-A-SNMP-005 Multiple Simple Network Management Protocol
Vulnerabilities in Enclave Devices
Vulnerable Systems:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 440
BMC Patrol Agent for Unix v3.4.11, v3.4.00, v3.3.00
Compliance Checking:
Ask the SA if the BMC Patrol agent is installed on the system. If the agent is installed on the system and one of
the vulnerable versions listed, then check: http://www.bmc.com/info_center_support/snmp_cert_
advise041802.html to ensure the correct patches are installed. If the correct patches are not installed, then this is
a finding. Legacy version systems such as 3.400 and 3.3.00 need to contact BMC support for resolution.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0665V000583 Category I
9
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Multiple Simple Network Management Protocol Vulnerabilities in
Enclave Devices
Reference:
IAVA 2002-A-SNMP-005
111. IAVA0670 – 2002-A-SNMP-006 Multiple Simple Network Management Protocol
Vulnerabilities in Servers and Applications
Vulnerable Systems:
IRIX versions 5.3 to 6.4
Tivoli v7.1 NetView for UNIX
Compliance Checking:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 441
Irix
If the Irix operating system version is not at least 6.5, then this is a finding. Perform the following to
determine the operating system version:
# uname – a
Tivoli
If Tivoli Netview 7.1 is installed, ask the SA if they have applied all vendor patches for SNMP
vulnerabilities. If the patches have not been installed, then this is a finding. The IAVA and vendor do not list
specific patches to install.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0670V000584 Category I
0
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Multiple Simple Network Management Protocol Vulnerabilities in
Servers and Applications
Reference:
IAVA 2002-A-SNMP-006
112. IAVA0675 – 2003-A-0006 Multiple Vulnerabilities in Multiple Versions of Oracle
Database Server
Vulnerable Systems:
Oracle 8 8.0.6
Oracle 8i 8.0.x
Oracle 8i 8.1.7
Oracle 8i 8.1.x
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 442
Oracle 9i 9.0.2
Oracle 9i 9.0.1.3
Oracle 9i 9.0.1.2
Oracle 9i 9.0.1
Oracle 9i 9.0
Oracle 9i Release 1, 9.0.x
Oracle 9i Release 2, 9.2.2
Oracle 9i Release 2, 9.2.x
Oracle 9i Release 2, 9.2.1
Compliance Checking:
To check for patches, execute the following: %ORACLE_HOME%\bin\setup.exe On the Welcome screen, click
on the Installed Products button at the bottom of the screen. Expand each Oracle Home. Expand the Oneoffs
selection and view the installed patches. If patches listed are not there or the Oneoffs selection is not there, then
this is a Finding.
Ensure the following patches are installed:
2642117 Oracle Database Server DIRECTORY Buffer Overflow Vulnerability
2642267 Oracle Database Server TZ_OFFSET Buffer Overflow Vulnerability
2642439 Oracle Database Server TO_TIMESTAMP_TZ Buffer Overflow Vulnerability
2620726 Oracle Database Server ORACLE.EXE Buffer Overflow Vulnerability
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0675V000587 Category I
3
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Multiple Vulnerabilities in Multiple Versions of Oracle Database
Server
Reference:
IAVA 2003-A-0006
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 443
113. IAVA0680 – 2004-T-0002 Oracle 9i Application/Database Server Denial Of Service
Vulnerability
Vulnerable Systems:
Oracle9i Application Server Release 1, version 1.0.2.2
Oracle9i Application Server Release 2, version 9.0.2.1 and earlier versions
Oracle9i Application Server Release 2, version 9.0.3.0 and 9.0.3.1Oracle9i Database Server Release 2,
version 9.2.0.2
Oracle9i Database Server Release 1, version 9.0.1.4
Compliance Checking:
Use the Oracle opatch utility to list the installed patches with the opatch lsinventory – detail command. Patches
required are 2701372 or 2701717.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0680V000592 Category II
4
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Oracle 9i Application/Database Server Denial Of Service
Vulnerability
Reference:
IAVA 2004-T-0002
114. IAVA0685 – 2004-T-0005 Oracle9i Lite Mobile Server Multiple Vulnerabilities
Vulnerable Systems:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 444
Oracle9i Lite 5.0.0.0.0
Oracle9i Lite 5.0.1.0.0
Oracle9i Lite 5.0.2.0.0
Oracle9i Lite 5.0.2.9.0
Compliance Checking:
Use the Oracle opatch utility to list the installed patches with the opatch lsinventory – detail command. Patch
3369291 must be installed. If the patche is not installed, then this a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0685V000592 Category II
8
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Oracle9i Lite Mobile Server Multiple Vulnerabilities
Reference:
IAVA 2004-T-0005
115. IAVA0690 – 2004-T-0011 Oracle Application Server Web Cache HTTP Request Method
Heap Overrun Vulnerability
Vulnerable Systems:
Oracle Application Server Web Cache 10g 9.0.4 .0
Oracle Application Server 10g 9.0.4 .0
Oracle Oracle9i Application Server Web Cache 2.0.0 .0.4
Oracle Oracle9i Application Server 1.0.2 .2
Oracle Oracle9i Application Server Web Cache 9.0.2 .2
Oracle iStore 11i 11i.IBE.O
Oracle Oracle9i Application Server Web Cache 9.0.2 .3
Oracle Oracle9i Application Server Web Cache 9.0.3 .1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 445
Compliance Checking:
Use the Oracle opatch utility to list the installed patches with the opatch lsinventory command to include at least
one of the following patches: Patch 3319824 (10g), 3621435 (9iAS WC 9.0.3.1.0), 3573405 (9iAS WC 9.0.2.3.0)
, 3611297 (9iAS WC 2.0.0.4.0)
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0690V000594 Category II
0
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Oracle Application Server Web Cache HTTP Request Method
Heap Overrun Vulnerability
Reference:
IAVA 2004-T-0011
116. IAVA0695 – 2004-T-0022 Check Point VPN-1 ASN.1 Buffer Overflow Vulnerabil ity
Vulnerable Systems:
Linux and Solaris running Checkpoint Firewall products
Compliance Checking:
Each specific firewall product provided by Checkpoint contains a different patch to be applied. Due to the
large number of patches to be applied for each product, it is best to refer to https://www.jtfgno.mil/bulletins/
dodcert2004/2004-t-0022.htm to check for compliance.
Remediation Guidelines:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 446
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0695V000596 Category II
4
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Check Point VPN-1 ASN.1 Buffer Overflow Vulnerabil ity
Reference:
IAVA 2004-T-0022
117. IAVA0700 – 2004-T-0026 Mozilla Network Security Services Library Remote Heap
Overflow Vulnerability
Vulnerable Systems:
HP-UX B.11.23 and prior
Mozilla Network Security Services (NSS) 3.9.0 and prior
Mozilla Browser 1.4.0-1.5.0
Sun ONE Application Server 7.0.0 and prior
Sun ONE Directory Server 5.2.0 and prior
Sun ONE Web Server 6.1.0 and prior
Sun Java Enterprise System
Compliance Checking:
HP-UX
To determine if a system has an affected version, search the output of "swlist -a revision -l fileset" for an
affected fileset. The following filesets should be checked for:
NetscapeDirSvr6.NDS-SLAPD
NetscapeDirSvr6.NDS-ADM
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 447
No patches exist for this vulnerability, but the IAVA does list specific work around procedures. If the
workaround has not been applied, then this is a finding.
Sun Java System
Check the version number of the Sun Java system component. If the version is not at least one of the
versions listed below, then this is a finding.
Sun Java System Web Server 6.0 SP 9 and later
Sun Java System Web Server 6.1 SP 3 and later
Sun Java System Application Server 7 2004Q2 Update 1 and later
Sun Java System Application Server 7 Update 5 and later
Sun Java Enterprise System
For Solaris 8 sparc check for the following patches with procedures in Appendix F:
114045-12 or later
115924-09 or later
For Solaris 9 sparc check for the following patches with procedures in Appendix F:
114049-12 or later
115926-10 or later
For Solaris 9 x86 check for the following patches with procedures in Appendix F:
114050-12 or later
115927-10 or later
Mozilla Network Security Services
Check the version of the Mozilla NSS. If the version is not at 3.9.2, then this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 448
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0700V000596 Category II
9
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Mozilla Network Security Services Library Remote Heap Overflow
Vulnerability
Reference:
IAVA 2004-T-0026
118. IAVA0705 – 2004-T-0027 Multiple Vulnerabilities in MIT Kerberos V
Vulnerable Systems:
Kerberos V
RedHat Enterprise Linux AS 3
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux WS 3
Sun SEAM 1.0.2
Sun Solaris 9.0.0
Sun Solaris 9.0.0 _x86
Compliance Checking:
Redhat
# rpm –qa |grep krb5
If any of the Kerberos packages are installed, then either the workstation or server package with it’s version
number should be returned from the preceeding command. If the package version is not at least 1.3.4-5, then
this is a finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 449
Solaris 9
# grep default_realm /etc/krb5/krb5.conf | grep -v ___default_realm ___
If the command returns no output or the "krb5.conf" file is not found, then the system is not configured for
Kerberos and this check is not applicable. Otherwise, perform procedures in Appendix F, Patch Control, to check
for the following patches:
Sparc- 112908-16 or later
x86- 115168-05 or later
If the patches are not found on the system and Kerberos is utilized, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0705V000597 Category II
0
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Multiple Vulnerabilities in MIT Kerberos V
Reference:
IAVA 2004-T-00 27
119. IAVA0710 – 2004-B-0009 Oracle E-Business Suite Mult iple SQL Injection
Vulnerable Systems:
Oracle Applications 11.0 (all releases)
Oracle E-Business Suite Release 11i, 11.5.1 through 11.5.8
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 450
Compliance Checking:
To check for patches, open the Oracle Universal Installer: On the Welcome screen, click on the Installed
Products button at the bottom of the screen. Expand each Oracle Home. Expand the Oneoffs selection and view
the installed patches. If patches listed are not there or the Oneoffs selection is not there, then this is a Finding. At
least one of the patches should be listed for each occurrence of an installed component: E-business suite patch
3644626, Applications suite patch 3648066.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0710V000595 Category I
4
:
MAC/Confidentiality Levels:
Status Code: PART
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Oracle E-Business Suite Multiple SQL Injection Vulnerability
Reference:
IAVA 2004-B-0009
120. IAVA0715 – 2005-T-0031 Multiple Vulnerabilities in Computer Associates Message
Queuing
Vulnerable Systems:
Computer Associates Advantage Data Transport 3.0.0
Computer Associates AdviseIT 2.4.0
Computer Associates BrightStor Portal 11.1.0
Computer Associates BrightStor SAN Manager 1.1.0
Computer Associates BrightStor SAN Manager 1.1.0 SP1
Computer Associates BrightStor SAN Manager 1.1.0 SP2
Computer Associates BrightStor SAN Manager 11.1.0
Computer Associates CAM 1.5.0
Computer Associates CAM 1.7.0
Computer Associates CAM 1.11.0
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 451
Computer Associates CleverPath Aion 10.0.0
Computer Associates CleverPath ECM 3.5.0
Computer Associates CleverPath OLAP 5.1.0
Computer Associates CleverPath Predictive Analysis Server 2.0.0
Computer Associates CleverPath Predictive Analysis Server 3.0.0
Computer Associates eTrust Admin 2.1.0
Computer Associates eTrust Admin 2.4.0
Computer Associates eTrust Admin 2.7.0
Computer Associates eTrust Admin 2.9.0
Computer Associates eTrust Admin 8.0.0
Computer Associates eTrust Admin 8.1.0
Computer Associates Unicenter Application Performance Monitor 3.0.0
Computer Associates Unicenter Application Performance Monitor 3.5.0
Computer Associates Unicenter Asset Manager
Computer Associates Unicenter Data Transport Option 2.0.0
Computer Associates Unicenter Enterprise Job Manager 1.0.0 SP1
Computer Associates Unicenter Enterprise Job Manager 1.0.0 SP2
Computer Associates Unicenter Jasmine 3.0.0
Computer Associates Unicenter Management for Lotus Notes/Domino 4.0.0
Computer Associates Unicenter Management for Web Servers 5.0.0
Computer Associates Unicenter Management for Web Servers 5.0.1
Computer Associates Unicenter Management for WebSphere MQ 3.5.0
Computer Associates Unicenter Management Portal 2.0.0
Computer Associates Unicenter Management Portal 3.1.0
Computer Associates Unicenter Network and Systems Management 3.0.0
Computer Associates Unicenter Network and Systems Management 3.1.0
Computer Associates Unicenter NSM Wireless Network Management Option 3.0.0
Computer Associates Unicenter Performance Management for OpenVMS 2.4.0 SP3
Computer Associates Unicenter Remote Control 6.0.0
Computer Associates Unicenter Remote Control 6.0.0 SP1
Computer Associates Unicenter Service Level Management 3.0.0
Computer Associates Unicenter Service Level Management 3.0.1
Computer Associates Unicenter Service Level Management 3.0.2
Computer Associates Unicenter Service Level Management 3.5.0
Computer Associates Unicenter Software Delivery 3.0.0
Computer Associates Unicenter Software Delivery 3.1.0
Computer Associates Unicenter Software Delivery 3.1.0 SP1
Computer Associates Unicenter Software Delivery 3.1.0 SP2
Computer Associates Unicenter Software Delivery 4.0.0
Computer Associates Unicenter Software Delivery 4.0.0 SP1
Computer Associates Unicenter TNG 2.1.0
Computer Associates Unicenter TNG 2.2.0
Computer Associates Unicenter TNG 2.4.0
Computer Associates Unicenter TNG 2.4.2
Computer Associates Unicenter TNG JPN 2.2.0
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 452
Compliance Checking:
Simply running camstat will return the version information in the top line of the output on any platform. The
camstat command is located in the bin subfolder of the installation directory.
The /etc/catngcampath text file holds the CAM install location
The version should be at least CAM 1.07 Build 220_13 or CAM 1.11 Build 29_13 depending on the installation
major release number.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0715V001168 Category II
0
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Multiple Vulnerabilities in Computer Associates Message Queuing
Reference:
IAVA 2005-T-0031
121. IAVA0720 – 2005-B-0007 Symantec UPX Parsing Engine Re mote Heap
Vulnerable Systems:
Symantec AntiVirus Corporate Edition 8.0.0 1
Symantec AntiVirus Corporate Edition 8.1.1
Symantec AntiVirus Corporate Edition 9.0.0
Symantec AntiVirus for Caching
Symantec AntiVirus for Network Attached Storage
Symantec AntiVirus for SMTP 3.1.0
Symantec AntiVirus Scan Engine 4.0.0
Symantec AntiVirus Scan Engine 4.3.0
Symantec AntiVirus Scan Engine for Bluecoat 4.0.0
Symantec AntiVirus Scan Engine for Bluecoat 4.3.0
Symantec AntiVirus Scan Engine for Caching 4.3.0
Symantec AntiVirus Scan Engine for Filers 4.3.0
Symantec AntiVirus Scan Engine for ISA 4.0.0
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 453
Symantec AntiVirus Scan Engine for ISA 4.3.0
Symantec AntiVirus Scan Engine for Netapp Filer 4.0.0
Symantec AntiVirus Scan Engine for Netapp Filer 4.3.0
Symantec AntiVirus Scan Engine for Netapp NetCache 4.0.0
Symantec AntiVirus Scan Engine for Netapp NetCache 4.3.0
Symantec AntiVirus/Filtering for Domino Ports 3.0.0 (AIX) build 3.0.5
Symantec AntiVirus/Filtering for Domino Ports 3.0.0 (Linux) build 3.0.5
Symantec Brightmail Anti-Spam 4.0.0
Symantec Brightmail Anti-Spam 5.5.0
Symantec Client Security 1.0.1
Symantec Client Security 1.1.1
Symantec Gateway Security 5300 1.0.0
Symantec Gateway Security 5400 2.0.0
Symantec Gateway Security 5400 2.0.1
Symantec Mail Security for SMTP 4.0.0
Symantec Norton AntiVirus 2004
Symantec Norton Internet Security 2004 Professional Edition
Symantec Norton System Works 2004
Symantec Web Security 3.0.0
Compliance Checking:
Ask the system administrator if any of the products listed in the vulnerable systems are installed on the system.
Ask the administrator if the most current product update which is available from https://www.jtfgno.mil has been
installed. This is a finding if the most recent software has not been installed.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0720V000601 Category I
5
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
DCSQ-1, VIVM-1
PDI Description:
Symantec UPX Parsing Engine Remote Heap Overflow
Vulnerability
Reference:
IAVA 2005-B-0007
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 454
122. IAVA0725 – 2005-B-0008 Trend Micro VSAPI ARJ Hand ling Heap Overflow
Vulnerable Systems:
Trend Micro InterScan Messaging Security Suite for Linux
Trend Micro InterScan Messaging Security Suite for Solaris
Trend Micro InterScan VirusWall for Linux
Trend Micro InterScan VirusWall for HP-UX
Trend Micro InterScan VirusWall for AIX
Trend Micro InterScan VirusWall for Solaris
Trend Micro InterScan Web Security Suite for Linux
Trend Micro InterScan Web Security Suite for Solaris
Trend Micro ServerProtect for Linux
Compliance Checking:
Ask the system administrator if any of the above products are installed on the machine. If any of the above
products are installed, ask the system administrator if an appropriate vendor patch has been installed from https://
www.jtfgno.mil. If the specific patch listed in the IAVA has not been installed, then this is a finding.
Control Manager
File
Program
Platform
Version
vsapi-solaris-7.510- Solaris
1002.tar.z
Engine
Version
2.0 and above 7.510
Size
Release
Date
992.0KBFeb 24,
2005
InterScan Messaging Security Suite
File
vsapi-x86-linux7.510-1002.tar.z
Program
Platform
Version
Linux
Engine
Version
5.5 and above 7.510
http://s3.amazonaws.com/0706/819143.html
Size
Release
Date
892.0KBFeb 24,
2005
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
vsapi-solaris-7.5101002.tar.z
Page 455
Solaris
5.0 and above 7.510
992.0KBFeb 24,
2005
InterScan VirusWall
Program
Platform
Version
Engine
Version
vsapi-x86-linux7.510-1002.tar.z
Linux
3.01 and
above
7.510
892.0KBFeb 24,
2005
vsapi-solaris-7.5101002.tar.z
Solaris
3.0 and above 7.510
992.0KBFeb 24,
2005
vsapi-hpux-7.5101002.tar.z
HP-UX 3.0 and above 7.510
1.1MB Feb 24,
2005
vsapi-aix-7.5101002.tar.z
AIX
1.2MB Feb 24,
2005
File
3.6
7.510
Size
Release
Date
InterScan Web Security Suite
File
Program
Platform
Version
Engine
Version
Size
Release
Date
vsapi-x86-linux7.510-1002.tar.z
Linux
2.0 and above 7.510
892.0KBFeb 24,
2005
vsapi-solaris-7.5101002.tar.z
Solaris
1.0 and above 7.510
992.0KBFeb 24,
2005
ServerProtect for Linux
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 456
Program
Platform
Version
File
vsapi-x86-linux7.510-1002.tar.z
Linux
Engine
Version
1.0 and above 7.510
Size
Release
Date
892.0KBFeb 24,
2005
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
123. IAVA0730 – 2005-A-0043 Symantec AntiVirus Library RAR Decompression
Vulnerable Systems:
Symantec AntiVirus/Filtering for Domino (AIX, Linux, Solaris)3.0.11
Symantec Scan Engine 5.0
Symantec AntiVirus Scan Engine 4.1.8 4.3.12
Symantec AntiVirus for Messaging 4.3.12
Symantec AntiVirus for NAS 4.3.12
Symantec AntiVirus Scan Engine for NetApp Filer 4.0 4.3
Symantec AntiVirus Scan Engine for NetApp NetCache 4.0 4.3
Symantec AntiVirus Scan Engine for Bluecoat 4.0 4.3
Symantec AntiVirus for Clearswift 4.3.12
Symantec AntiVirus Scan Engine for Caching 4.3.12
Symantec AntiVirus for SMTP 3.1 4.1.9
Symantec Client Security 3.X
Symantec Web Security 3.0.1
Symantec Gateway Security 5000 Series 3.0
Symantec Gateway Security 5400 Series 2.0
Symantec Gateway Security 1.0
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 457
Symantec BrightMail AntiSpam 4.0 5.5 6.0
Symantec AntiVirus Corporate Edition 10.X
Compliance Checking:
If any of the above specific product versions are installed, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
124. IAVA0735 – 2006-T-0002 Multiple Vulnerabilities within BEA WebLogic Software
Vulnerable Systems:
BEA Systems WebLogic Express 6.1.0
BEA Systems WebLogic Express 6.1.0 SP 1-8
BEA Systems WebLogic Express 7.0.0
BEA Systems Weblogic Server 6.1.0 SP 1-7
BEA Systems Weblogic Server 7.0.0
BEA Systems Weblogic Server 7.0.0 SP 1-6
BEA Systems Weblogic Server 7.0.0 .0.1
BEA Systems Weblogic Server 7.0.0 .0.1 SP 1-4
BEA Systems Weblogic Server 8.1.0
BEA Systems Weblogic Server 8.1.0 SP 1-5
BEA Systems Weblogic Server 9.0
Compliance Checking:
To determine the version number run the setEnv.sh script which is under:
# WL_HOME/config/{your-domain}/setEnv.sh
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 458
Then run “java weblogic.version” which should produce version string output.
This can also be checked from the weblogic console directly by:
Mydomain > Servers > myserver and select the Monitoring/Versions tab.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
125. IAVA0740 – 2006-T-0005 Multiple Vulnerabilities in Mozilla Products
Vulnerable Systems:
Firefox and Thunderbird prior to version 1.5.0.1
Seamonkey prior to version 1.0.
Compliance Checking:
Check that FireFox and Thunderbird has been updated to version 1.5.0.1 or higher. Seamonkey should be at v
ersion 1.0 or higher. The versions can usually be checked from the Help|About menu within the graphical menu
toolbar.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
126. IAVA0745 – 2006-T-0007 Veritas NetBackup Multiple Remote Buffer Overflow
Vulnerable Systems:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 459
Veritas Software NetBackup BusinesServer 4.5.0 FP
Veritas Software NetBackup BusinesServer 4.5.0 MP
Veritas Software NetBackup DataCenter 4.5.0 FP
Veritas Software NetBackup DataCenter 4.5.0 MP
Veritas Software NetBackup Enterprise Server 5.0.0
Veritas Software NetBackup Enterprise Server 5.1.0
Veritas Software NetBackup Enterprise Server 6.0.0
Compliance Checking:
To check the version number, perform the following. Open the netbackup administration console. Select Help
and About to obtain version information. If the version is one of those listed in the vulnerable systems above,
then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
127. IAVA0755 – 2006-T-0009 Multiple Vulnerabilities i n Symantec AntiVirus Engine
Vulnerable Systems:
Symantec Anti-virus scan engine prior to 5.1
Compliance Checking:
To determine which version of Symantec Antivirus you have, start the application and select Help|About.
This should display the scan version engine. Some instances display the engine version on the main application
window.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 460
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
128. IAVA0760 – 2006-T-0013 RealVNC Remote Aut hentication Bypass
Vulnerable Systems:
Real VNC 4.1.1
Compliance Checking:
To determine if the vnc software is installed on a unix machine perform the following:
# find / -name vncserver –print
If the software is found, perform the following to retrieve the version information:
# vncserver –help
This will display the version on the first line returned. If the version is not at least 4.2.3, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
129. IAVA0765 – 2006-T-0023 Multiple Vulnerabilities in Wireshark
Vulnerable Systems:
Wireshark 0.99.2 or Ethereal 0.99.0 or earlier
Compliance Checking:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 461
Check for the existence of wireshark with the following command:
# find / -name tshark –print
If the binary for tshark is found, continue with the following command to check the version.
# tshark –v
If the version displayed is not at least 0.99.3, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
130. IAVA0770 – 2006-T-0035 Sun Java System/iPlane t Messaging Server
Vulnerable Systems:
iPlanet Messaging Server 5.2 (for Solaris 8 and 9) without patch 5.2hf2.13
Sun Java System Messaging Server 6.0, 6.1, and 6.2 (for Solaris 8, 9, and 10) without patch 118207-56
Sun Java System Messaging Server 6.0, 6.1, and 6.2 (for Solaris 9 and 10) without patch 118208-56
Sun Java System Messaging Server 6.0, 6.1, and 6.2 (for RHEL 2.1 and 3.0) without patch 118209-56
Compliance Checking:
To determine if Sun Java System Messaging Server is installed on a system, the following command can be run:
# pkginfo SUNWmsgco
application SUNWmsgco Sun Java System Messaging Server Core Libraries
To determine the version of iPlanet Messaging Server on a system, the following command can be run:
# cat /etc/msgregistry.inf
A list of instances and installs will displayed (if any) if this file exists.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 462
To determine the version of Sun Java Messaging Server on a system, the following command can be run:
# /opt/SUNWmsgsr/sbin/imsimta version
If the software is installed without the patches mentioned in the vulnerable systems section, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
131. IAVA0775 – 2006-B-0016 Multiple Remote Denial of Service Vulnerabilities within ISC
BIND
Vulnerable Systems:
BIND 9.3.0, BIND 9.3.1, BIND 9.3.2, BIND 9.3.3b1 and BIND 9.3.3rc1
BIND 9.4.0a1, 9.4.0a2, 9.4.0a3, 9.4.0a4, 9.4.0a5, 9.4.0a6 and 9.4.0b1
Compliance Checking:
Perfrom the following to determine the version of BIND.
# named –v
Or
# what /usr/sbin/named -v
If the version is not one of the following: BIND 9.3.2-P1, BIND 9.2.7 or BIND 9.2.6-P1, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 463
132. IAVA0780 – 2006-B-0017 Multiple Vulnerabilities in Adobe Flash Player
Vulnerable Systems:
Flash Player 8.0.24.0 and prior
Flash Professional 8
Flash Basic
Flash MX
2004Adobe Flex 1.5
Compliance Checking:
To verify the Flash Player version number, access the About Flash Player page, or right-click on Flash
content and select “About Macromedia Flash Player” from the menu. If you use multiple browsers, perform the
check and the installation for each browser . If the version is Adobe Flash Player 8.0.24 and earlier then this is a
finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
133. IAVA0785 – 2006-A-0008 Computer Associates (CA) iTechnology iGateway Service
Vulnerability
Vulnerable Systems:
Computer Associates: CA iTechnology iGateway 4.0
Compliance Checking:
Check for the following version of iGateway 4.0.051230. If the version is not at least 4.0.051230 then this is a
finding. Patches can be obtained from
ftp://ftp.ca.com/pub/iTech/downloads
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 464
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
PDI:
IAVA0785V001172 Category I
4
:
MAC/Confidentiality Levels:
Status Code: MAN
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECMT-1, ECMT-2, VIVM-1
PDI Description:
Computer Associates (CA) iTechnology iGateway Service
Vulnerability
Reference:
IAVA 2006-A-0008
134. IAVA0805 – 2006-A-0050 Multiple Vulnerabilities in Oracle E-Business Suite and
Applications
Vulnerable Systems:
Oracle E-Business Suite Release 11i, versions 11.5.7 - 11.5.10 CU2
Oracle E-Business Suite Release 11.0
Oracle9i Application Server Release 1, version 1.0.2.2
Compliance Checking:
To check for patches, open the Oracle Universal Installer: On the Welcome screen, click on the Installed
Products button at the bottom of the screen. Expand each Oracle Home. Expand the Oneoffs selection and view
the installed patches. If patches listed are not there or the Oneoffs selection is not there, then this is a Finding.
Apply all patches listed for the E-Business version listed: 11.5.10 CU2: 5447522, 5486407, 5479643, 5500118,
5335967, 5483388 11.5.10 and CU1: 5447522, 5486407, 5479643, 5500118, 5335967, 4580011 11.5.9:
5447522, 5486408, 5479643, 5500118, 4665644, 5483382, 5534762 11.5.8: 5447522, 5479643, 5500118,
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 465
5549711, 5483377, 5534752 11.5.7: 5447522, 5479643, 5500118, 5534742 For Oracle Mobile Field Service
(MFS) customers: 5483388, 5483382, 5483377 For Oracle Trading Community Architecture customers: If your
instance is at 11i.HZ.G or 11i.HZ.H, then apply patch 5521537. If your instance is at 11i.HZ.I to 11i.HZ.L, then
apply patch 3748842. If your instance is at 11i.HZ.M, then apply patch 5521476. If your instance is at 11i.HZ.N,
then apply patch 5526897. Versions earlier than 11.5.7 are no longer supported.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
135. IAVA0810 – 2007-T-0001 MIT Kerberos 5 RPC Library Remote Code Execution
Vulnerability
Vulnerable Systems:
MIT Kerberos 5 1.5.1 and earlier
Compliance Checking:
#
strings libkrb5.so | grep BRAND
If the version is not at least 5.1.5.2 or 5.1.6, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
136. IAVA0815 – 2007-T-0002 MIT Kerberos 5 Administration Daemon Remote Code
Execution Vulnerability
Vulnerable Systems:
MIT Kerberos 5 1.5 and Kerberos 5.1.5.1
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 466
Compliance Checking:
#
strings libkrb5.so | grep BRAND
If the version is not at least 5.1.5.2 or 5.1.6, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
137. IAVA0820 – 2007-T-0003 Sun Java RunTime Environment GIF Images Buffer Overflow
Vulnerability
Vulnerable Systems:
JDK and JRE 5.0 Update 9 and earlier
SDK and JRE 1.4.2_12 and earlier
SDK and JRE 1.3.1_18 and earlier
Compliance Checking:
To determine the version of Java on a system, the following command can be run:
#
java –fullversion
Or
#
java –version
If the version is not at least equal to or greater than one of the following, then this is a finding:
JDK and JRE 5.0 Update 10 or later
SDK and JRE 1.4.2_13 or later
SDK and JRE 1.3.1_19 or later
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 467
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
138. IAVA0825 – 2007-A-0001 Snort Backtracking Denial of Service Vulnerability
Vulnerable Systems:
All versions prior to Snort Project Snort 2.6.1
Compliance Checking:
To determine the version of snort, issue the following command:
# snort -V
If the version is not at least 2.6.1.2 or later, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
PDI:
Page 468
IAVA0825V001357 Category I
7
:
MAC/Confidentiality Levels:
Status Code: AUTO
Previously:
N/A
MAC I – CSP, MAC II – CSP, MAC III – CSP
IA Controls:
ECMT-1, ECMT-2,VIVM-1
PDI Description:
Snort Backtracking Denial of Service Vulnerability
Reference:
IAVA 2007-A-0001
139. IAVA0830 – 2007-A-0002 Snort GRE Packet Decoding Integer Underflow Vulnerability
Vulnerable Systems:
Snort 1.3.1 or later with the special option for developers for experimental pre-processor.
Compliance Checking:
To determine the version of snort, issue the following command:
# snort -V
I f the version is 2.6.1.2, ask the SA if the executable binary was compiled against source code with the
developers option enabled. If it has been, then this is a finding.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
140. IAVA0835 – 2007-A-0006 Multiple Vulnerabilities in Adobe Acrobat
Vulnerable Systems:
Adobe Acrobat version s 6.0.5 and prior and versions 7.0.8 and prior.
Compliance Checking:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 469
To determine the version perform the following:
1. Launch Acrobat Reader by executing /bin/acroread
2. Select "help" menu option, and
3.
Select "about Acrobat Reader."
If the version is not at least one of the following, then this is a finding:
Acrobat 6.0.6 or later OR 7.0.9 or later OR 8.0 or later.
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
141. IAVA0840 – 2007-A-0007 Multiple Vulnerabilities in Oracle Database Server
Vulnerable Systems:
Oracle Database 10 g Release 2, versions 10.2.0.1, 10.2.0.2, 10.2.0.3
Oracle Database 10g Release 1, versions 10.1.0.4, 10.1.0.5
Oracle9i Database Release 2, versions 9.2.0.7, 9.2.0.8
Compliance Checking:
To check for patches, execute the following: runInstaller.exe
On the Welcome screen, click on the Installed Products button at the bottom of the screen. Expand each Oracle
Home. Expand the Oneoffs selection and view the installed patches. If patches listed are not there or the
Oneoffs selection is not there, then this is a Finding.
Version
Version
9.2.0.5
2/5/2007
10.1.0.4
5689894
9.2.0.6
2/5/2007
10.1.0.5
5689908
9.2.0.7
5689875
10.2.0.1
5689937
9.2.0.8
5490859
10.2.0.2
5689957
10.1.0.3
2/5/2007
10.2.0.3
NA
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 470
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
142. IAVA0845 – 2007-A-0008 Multiple Vulnerabilities in Oracle Application Server
Vulnerable Systems:
Oracle Application Server 10g Release 3, versions 10.1.3.0.0, 10.1.3.1.0
Oracle Application Server 10g Release 2, versions 10.1.2.0.0 - 10.1.2.0.2, 10.1.2.1.0, 10.1.2.2.0
Oracle Application Server 10g (9.0.4), versions 9.0.4.2, 9.0.4.3
Compliance Checking:
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
143. IAVA0850 – 2007-A-0009 Multiple Vulnerabilities in Oracle Collaboration Suite
Vulnerable Systems:
Oracle9 i Database Release 1, version 9.0.1.4
Oracle9i Application Server Release 2, version 9.0.2.3
Compliance Checking:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 471
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
144. IAVA0855 – 2007-A-0010 Multiple Vulnerabilities in Oracle E-Business Suite
Vulnerable Systems:
Oracle E-Business Suite Release 11 i, versions 11.5.7 - 11.5.10 CU2
Oracle E-Business Suite Release 11.0
Compliance Checking:
Remediation Guidelines:
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
145. IAVA0860 – 2007-A-0011 Multiple Vulnerabilities in Oracle Enterprise Manager
Vulnerable Systems:
Oracle Enterprise Manager 10 g Grid Control Release 2, version 10.2.0.1
Oracle Enterprise Manager 10g Grid Control Release 1, versions 10.1.0.4, 10.1.0.5
Compliance Checking:
Remediation Guidelines:
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM
4 SYSTEM CHECKS
Page 472
Upgrade to, at the least, the required software release, apply the applicable patch, or remove the binary/
application to remediate this finding.
Or, the vulnerable binary may be renamed and the permissions modified to 000 to downgrade the finding,
for example a CAT I finding may be downgraded to a CAT II.
This page is intentionally left blank.
http://s3.amazonaws.com/0706/819143.html
07/14/2007 08:21:33 AM