Solaris 10 X86 Security Technical Implementation Guide
Open a previous version of this SCAP benchmark.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- GEN000460
- Vuln IDs
- V-220074
- Rule IDs
- SV-220074r505926_rule
Fix: F-21782r488277_fix
Set RETRIES to 3 in the /etc/default/login file. #vi /etc/default/login Set LOCK_AFTER_RETRIES to YES in the /etc/security/policy.conf file. #vi /etc/security/policy.conf
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- GEN000480
- Vuln IDs
- V-220075
- Rule IDs
- SV-220075r505926_rule
Fix: F-21783r488280_fix
Edit the /etc/default/login file and set SLEEPTIME to 4.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000880
- Vuln IDs
- V-220078
- Rule IDs
- SV-220078r505926_rule
Fix: F-21786r488343_fix
Remove or change the UID of accounts other than root that have UID 0.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- GEN001300
- Vuln IDs
- V-220081
- Rule IDs
- SV-220081r505926_rule
Fix: F-21789r488427_fix
Change the mode of library files to 0755 or less permissive. Procedure (example): # chmod 0755 /path/to/library-file NOTE: Library files should have an extension of .a or .so, possibly followed by a version number.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN001780
- Vuln IDs
- V-220087
- Rule IDs
- SV-220087r505926_rule
Fix: F-21795r488592_fix
Edit /etc/profile or another global initialization script and add the mesg -n command.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003810
- Vuln IDs
- V-220091
- Rule IDs
- SV-220091r505926_rule
Fix: F-21799r489821_fix
Disable the portmap service. # svcadm disable network/rpc/bind
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- GEN003820
- Vuln IDs
- V-220092
- Rule IDs
- SV-220092r505926_rule
Fix: F-21800r489827_fix
Disable the remote shell service and restart inetd. Procedure: # svcadm disable network/shell # svcadm refresh inetd
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- GEN003830
- Vuln IDs
- V-220093
- Rule IDs
- SV-220093r505926_rule
Fix: F-21801r489833_fix
Disable the rlogind service. # svcadm disable rlogin # svcadm refresh inetd
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-001941
- Version
- GEN005500
- Vuln IDs
- V-220108
- Rule IDs
- SV-220108r505926_rule
Fix: F-21816r490076_fix
Edit the configuration file and modify the Protocol line to look like: Protocol 2 Reload sshd: kill -HUP <PID of sshd>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006620
- Vuln IDs
- V-220118
- Rule IDs
- SV-220118r505926_rule
Fix: F-21826r490301_fix
Edit the /etc/hosts.allow and /etc/hosts.deny files to configure access restrictions.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- GEN008660
- Vuln IDs
- V-220123
- Rule IDs
- SV-220123r505926_rule
Fix: F-21831r490394_fix
Configure the system to use the GRUB bootloader.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- GEN008700
- Vuln IDs
- V-220124
- Rule IDs
- SV-220124r505926_rule
Fix: F-21832r490400_fix
The GRUB console boot loader can be configured to use an MD5 encrypted password by adding password --md5 password-hash to the /pool-name/boot/grub/menu.lst or /boot/grub/menu.lst file. Use grub-md5-crypt to generate MD5 passwords from the command line.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00020
- Vuln IDs
- V-227532
- Rule IDs
- SV-227532r505926_rule
Fix: F-29682r488124_fix
Edit /etc/rmmount.conf and add the nosuid mount option to the configuration.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00060
- Vuln IDs
- V-227534
- Rule IDs
- SV-227534r505926_rule
Fix: F-29684r488130_fix
Change the owner of the /etc/security/audit_user file to root. # chown root /etc/security/audit_user
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00080
- Vuln IDs
- V-227535
- Rule IDs
- SV-227535r505926_rule
Fix: F-29685r488133_fix
Change the group owner of the audit_user file to root, bin, or sys. Example: # chgrp root /etc/security/audit_user
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- GEN000000-SOL00100
- Vuln IDs
- V-227536
- Rule IDs
- SV-227536r505926_rule
Fix: F-29686r488136_fix
Change the mode of the audit_user file to 0640. # chmod 0640 /etc/security/audit_user
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-000032
- Version
- GEN000000-SOL00220
- Vuln IDs
- V-227541
- Rule IDs
- SV-227541r505926_rule
Fix: F-29691r488157_fix
Create the /usr/aset/userlist file and populate it with a list of authorized users.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00240
- Vuln IDs
- V-227542
- Rule IDs
- SV-227542r505926_rule
Fix: F-29692r488160_fix
Use the chmod command to change the owner of the /usr/aset/userlist file. # chown root /usr/aset/userlist
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00250
- Vuln IDs
- V-227543
- Rule IDs
- SV-227543r505926_rule
Fix: F-29693r488163_fix
Change the group ownership of the file. # chgrp root /usr/aset/userlist
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00260
- Vuln IDs
- V-227544
- Rule IDs
- SV-227544r505926_rule
Fix: F-29694r488166_fix
Change the mode of the /usr/aset/userlist file to 0600. # chmod 0600 /usr/aset/userlist
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- GEN000000-SOL00400
- Vuln IDs
- V-227546
- Rule IDs
- SV-227546r505926_rule
Fix: F-29696r503652_fix
Edit /etc/dfs/dfstab and add the log option to all exported filesystems. Run the shareall command for the changes to take effect. NFS version 2 or 3 must be forced by updating the NFS_SERVER_VERSMAX variable appropriately in /etc/default/nfs and restarting the NFS daemon.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- GEN000000-SOL00440
- Vuln IDs
- V-227548
- Rule IDs
- SV-227548r505926_rule
Fix: F-29698r488178_fix
Change the default GID of non-root accounts to a valid GID other than 0.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00540
- Vuln IDs
- V-227549
- Rule IDs
- SV-227549r505926_rule
Fix: F-29699r488181_fix
Change the ownership of the files and directories. # chown -R root /etc/zones
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00560
- Vuln IDs
- V-227550
- Rule IDs
- SV-227550r505926_rule
Fix: F-29700r488184_fix
Change the group ownership of the files and directories. # chgrp -R sys /etc/zones # chgrp root /etc/zones/*.xml # chgrp bin /etc/zones/SUN*.xml
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000000-SOL00580
- Vuln IDs
- V-227551
- Rule IDs
- SV-227551r505926_rule
Fix: F-29701r488187_fix
Change the mode of the file or directory. # chmod 0644 <file> For directories: # chmod 0755 <directory>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000241
- Vuln IDs
- V-227561
- Rule IDs
- SV-227561r505926_rule
Fix: F-29711r488220_fix
Determine the type of zone that you are currently securing. # zonename If the command output is not "global", then NTP must be disabled. # svcadm disable ntp If the output from "zonename" is "global", then NTP must be enabled. # svcadm enable ntp
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000250
- Vuln IDs
- V-227564
- Rule IDs
- SV-227564r505926_rule
Fix: F-29714r488229_fix
Change the owner of the NTP configuration file to root. # chown root /etc/inet/ntp.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000251
- Vuln IDs
- V-227565
- Rule IDs
- SV-227565r505926_rule
Fix: F-29715r488232_fix
Change the group owner of the NTP configuration file. Procedure: # chgrp root /etc/inet/ntp.conf
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN000252
- Vuln IDs
- V-227566
- Rule IDs
- SV-227566r505926_rule
Fix: F-29716r488235_fix
Change the mode of the NTP configuration file to 0640 or less permissive. # chmod 0640 /etc/inet/ntp.conf
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN000380
- Vuln IDs
- V-227573
- Rule IDs
- SV-227573r505926_rule
Fix: F-29723r488259_fix
Add a group to the system for each GID referenced that does not have a corresponding group. #/usr/sbin/groupadd < group >
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- GEN000560
- Vuln IDs
- V-227582
- Rule IDs
- SV-227582r505926_rule
Fix: F-29732r488295_fix
Remove, lock, or configure a password for any account with a blank password.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- GEN000580
- Vuln IDs
- V-227583
- Rule IDs
- SV-227583r505926_rule
Fix: F-29733r488298_fix
Edit /etc/default/passwd and set the PASSLENGTH variable to 15 or greater.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- GEN000595
- Vuln IDs
- V-227586
- Rule IDs
- SV-227586r505926_rule
Fix: F-29736r503679_fix
If the /etc/security/crypt.conf file does not support FIPS 140-2 approved cryptographic hashing algorithms, upgrade to at least the Solaris 10 8/07 release. Edit the /etc/security/policy.conf file. # vi /etc/security/policy.conf Uncomment or add the CRYPT_ALGORITHMS_ALLOW line and set it to "5,6". Update the CRYPT_DEFAULT default line to be equal to 5 or 6. The following lines are acceptable. CRYPT_ALGORITHMS_ALLOW=5,6 CRYPT_DEFAULT=6 Update passwords for all accounts with non-compliant password hashes.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- GEN000750
- Vuln IDs
- V-227593
- Rule IDs
- SV-227593r505926_rule
Fix: F-29743r488328_fix
Edit /etc/default/passwd and set or add a MINDIFF setting equal to or greater than 8.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- GEN000800
- Vuln IDs
- V-227595
- Rule IDs
- SV-227595r505926_rule
Fix: F-29745r488337_fix
Edit /etc/default/passwd and set HISTORY to 5.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN000900
- Vuln IDs
- V-227597
- Rule IDs
- SV-227597r505926_rule
Fix: F-29747r503682_fix
The root home directory should be something other than / (such as /rootdir). Procedure: # mkdir /rootdir # chown root /rootdir # chgrp root /rootdir # chmod 700 /rootdir # cp -r /.??* /rootdir Edit the passwd file and change the root home directory to /rootdir. The cp -r /.??* command copies all files and subdirectories of file names beginning with "." into the new root directory, which preserves the previous root environment. The cp command must be executed from the / directory.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- GEN000920
- Vuln IDs
- V-227598
- Rule IDs
- SV-227598r505926_rule
Fix: F-29748r488349_fix
The root home directory will have permissions of 0700. Do not change the protections of the / directory. Use the following command to change protections for the root home directory. # chmod 0700 /rootdir.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000940
- Vuln IDs
- V-227600
- Rule IDs
- SV-227600r505926_rule
Fix: F-29750r503685_fix
Edit the root user's local initialization files. Remove any empty path entries. Remove any relative path entries that have not been documented with the ISSO. Edit the root user's local initialization files and remove any empty entry that is defined.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000945
- Vuln IDs
- V-227601
- Rule IDs
- SV-227601r505926_rule
Fix: F-29751r488358_fix
Edit the root user initialization files and remove any definition of LD_LIBRARY_PATH.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN000950
- Vuln IDs
- V-227602
- Rule IDs
- SV-227602r505926_rule
Fix: F-29752r488361_fix
Edit the root user initialization files and remove any definition of LD_PRELOAD.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- GEN000980
- Vuln IDs
- V-227603
- Rule IDs
- SV-227603r505926_rule
Fix: F-29753r488367_fix
Edit the /etc/default/login file and uncomment the line containing /dev/console if it is commented out.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000770
- Version
- GEN001120
- Vuln IDs
- V-227609
- Rule IDs
- SV-227609r505926_rule
Fix: F-29759r488385_fix
Edit the configuration file and set the PermitRootLogin option to no.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- GEN001240
- Vuln IDs
- V-227618
- Rule IDs
- SV-227618r505926_rule
Fix: F-29768r488412_fix
Change the group owner of system files to a system group. Procedure: # chgrp root /path/to/system/file (System groups other than root may be used.)
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- GEN001260
- Vuln IDs
- V-227619
- Rule IDs
- SV-227619r505926_rule
Fix: F-29769r488415_fix
Change the mode of the system log file(s) to 0640 or less permissive. Procedure: # chmod "0640" /path/to/system-log-file NOTE: Do not confuse system log files with audit logs. Any subsystems that require less stringent permissions must be documented.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN001320
- Vuln IDs
- V-227624
- Rule IDs
- SV-227624r505926_rule
Fix: F-29774r488433_fix
Change the ownership of NIS/NIS+/yp files to root, bin, or sys. Procedure: # chown -R root /usr/lib/netsvc/yp /var/yp
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN001340
- Vuln IDs
- V-227625
- Rule IDs
- SV-227625r505926_rule
Fix: F-29775r488436_fix
Change the group owner of the NIS files to root, bin, or sys. Procedure: # chgrp -R root /usr/lib/netsvc/yp /var/yp
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN001360
- Vuln IDs
- V-227626
- Rule IDs
- SV-227626r505926_rule
Fix: F-29776r488439_fix
Change the mode of NIS/NIS+/yp command files to 0755 or less permissive. Procedure: # chmod -R 0755 /usr/lib/netsvc/yp /var/yp
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001362
- Vuln IDs
- V-227628
- Rule IDs
- SV-227628r505926_rule
Fix: F-29778r488445_fix
Change the owner of the /etc/resolv.conf file to root. # chown root /etc/resolv.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001363
- Vuln IDs
- V-227629
- Rule IDs
- SV-227629r505926_rule
Fix: F-29779r488448_fix
Change the group owner of the /etc/resolv.conf file to root, bin, or sys. Procedure: # chgrp root /etc/resolv.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001364
- Vuln IDs
- V-227630
- Rule IDs
- SV-227630r505926_rule
Fix: F-29780r488451_fix
Change the mode of the /etc/resolv.conf file to 0644 or less permissive. # chmod 0644 /etc/resolv.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001366
- Vuln IDs
- V-227632
- Rule IDs
- SV-227632r505926_rule
Fix: F-29782r488457_fix
Change the owner of the /etc/hosts file to root. # chown root /etc/hosts
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001367
- Vuln IDs
- V-227633
- Rule IDs
- SV-227633r505926_rule
Fix: F-29783r488460_fix
Change the group owner of the /etc/hosts file to root, sys, or bin. Procedure: # chgrp root /etc/hosts
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001368
- Vuln IDs
- V-227634
- Rule IDs
- SV-227634r505926_rule
Fix: F-29784r488463_fix
Change the mode of the /etc/hosts file to 0644 or less permissive. # chmod 0644 /etc/hosts
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001371
- Vuln IDs
- V-227636
- Rule IDs
- SV-227636r505926_rule
Fix: F-29786r488469_fix
Change the owner of the /etc/nsswitch.conf file to root. # chown root /etc/nsswitch.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001372
- Vuln IDs
- V-227637
- Rule IDs
- SV-227637r505926_rule
Fix: F-29787r488472_fix
Change the group owner of the /etc/nsswitch.conf file to root, bin, or sys. Procedure: # chgrp root /etc/nsswitch.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001373
- Vuln IDs
- V-227638
- Rule IDs
- SV-227638r505926_rule
Fix: F-29788r488475_fix
Change the mode of the /etc/nsswitch.conf file to 0644 or less permissive. Procedure: # chmod 0644 /etc/nsswitch.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001378
- Vuln IDs
- V-227640
- Rule IDs
- SV-227640r505926_rule
Fix: F-29790r488481_fix
Change the owner of the /etc/passwd file to root. # chown root /etc/passwd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001379
- Vuln IDs
- V-227641
- Rule IDs
- SV-227641r505926_rule
Fix: F-29791r488484_fix
Change the group owner of the /etc/passwd file to root, bin, or sys. Procedure: # chgrp root /etc/passwd
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN001380
- Vuln IDs
- V-227642
- Rule IDs
- SV-227642r505926_rule
Fix: F-29792r488487_fix
Change the mode of the passwd file to 0644. Procedure: # chmod 0644 /etc/passwd Document all changes.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001391
- Vuln IDs
- V-227644
- Rule IDs
- SV-227644r505926_rule
Fix: F-29794r488493_fix
Change the owner of the /etc/group file to root. # chown root /etc/group
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001392
- Vuln IDs
- V-227645
- Rule IDs
- SV-227645r505926_rule
Fix: F-29795r488496_fix
Change the group owner of the /etc/group file. Procedure: # chgrp root /etc/group
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001393
- Vuln IDs
- V-227646
- Rule IDs
- SV-227646r505926_rule
Fix: F-29796r488499_fix
Change the mode of the /etc/group file to 0644 or less permissive. # chmod 0644 /etc/group
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN001400
- Vuln IDs
- V-227648
- Rule IDs
- SV-227648r505926_rule
Fix: F-29798r488505_fix
Change the ownership of the /etc/shadow file. # chown root /etc/shadow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001410
- Vuln IDs
- V-227649
- Rule IDs
- SV-227649r505926_rule
Fix: F-29799r488508_fix
Change the group owner of the /etc/shadow file. Procedure: # chgrp root /etc/shadow
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN001420
- Vuln IDs
- V-227650
- Rule IDs
- SV-227650r505926_rule
Fix: F-29800r488511_fix
Change the mode of the /etc/shadow (or equivalent) file. # chmod <mode> <file>
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN001440
- Vuln IDs
- V-227652
- Rule IDs
- SV-227652r505926_rule
Fix: F-29802r488517_fix
Assign a home directory to any user without one.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- GEN001470
- Vuln IDs
- V-227654
- Rule IDs
- SV-227654r505926_rule
Fix: F-29804r488523_fix
Migrate /etc/passwd password hashes to /etc/shadow. # pwconv
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001475
- Vuln IDs
- V-227655
- Rule IDs
- SV-227655r505926_rule
Fix: F-29805r488526_fix
Edit /etc/group and change the password field to an exclamation point (!) to lock the group password.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001600
- Vuln IDs
- V-227664
- Rule IDs
- SV-227664r505926_rule
Fix: F-29814r488559_fix
Edit the run control script and remove the relative path entries from the executable search path variable that are not documented with the ISSO. Edit the run control script and remove any empty entry that is defined.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001660
- Vuln IDs
- V-227668
- Rule IDs
- SV-227668r505926_rule
Fix: F-29818r488571_fix
Change the ownership of the run control script(s) with incorrect ownership. # chown root <run control script>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001680
- Vuln IDs
- V-227669
- Rule IDs
- SV-227669r505926_rule
Fix: F-29819r488574_fix
Change the group ownership of the run control script(s) with incorrect group ownership. Procedure: # chgrp root <run control script>
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN001800
- Vuln IDs
- V-227672
- Rule IDs
- SV-227672r505926_rule
Fix: F-29822r488595_fix
Change the mode of skeleton files with incorrect mode. # chmod 0644 <skeleton file>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001820
- Vuln IDs
- V-227674
- Rule IDs
- SV-227674r505926_rule
Fix: F-29824r488601_fix
Change the ownership of skeleton files with incorrect mode. # chown root <skeleton file>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001830
- Vuln IDs
- V-227675
- Rule IDs
- SV-227675r505926_rule
Fix: F-29825r488604_fix
Change the group owner of the skeleton file to root. Procedure: # chgrp <group> /etc/skel/[skeleton file]
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN001840
- Vuln IDs
- V-227676
- Rule IDs
- SV-227676r505926_rule
Fix: F-29826r503700_fix
Edit the global initialization file(s) with PATH variables containing relative paths and remove any relative path form the PATH variables that have not been documented with the ISSO. Edit the global initialization file(s) and remove any empty entry that is defined.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- GEN002040
- Vuln IDs
- V-227689
- Rule IDs
- SV-227689r505926_rule
Fix: F-29839r488649_fix
Remove the .rhosts, .shosts, hosts.equiv, and/or shosts.equiv files.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002100
- Vuln IDs
- V-227691
- Rule IDs
- SV-227691r505926_rule
Fix: F-29841r488655_fix
Edit /etc/pam.conf and remove the reference(s) to the rhosts_auth module.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002120
- Vuln IDs
- V-227692
- Rule IDs
- SV-227692r505926_rule
Fix: F-29842r503712_fix
Create a /etc/shells file containing a list of valid system shells. The list below contains the default shells from the shells(4) man page. Procedure (the command is 24 lines long): cat >/etc/shells <<EOF /bin/bash /bin/csh /bin/jsh /bin/ksh /bin/pfcsh /bin/pfksh /bin/pfsh /bin/sh /bin/tcsh /bin/zsh /sbin/jsh /sbin/sh /usr/bin/bash /usr/bin/csh /usr/bin/jsh /usr/bin/ksh /usr/bin/pfcsh /usr/bin/pfksh /usr/bin/pfsh /usr/bin/sh /usr/bin/tcsh /usr/bin/zsh EOF
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002340
- Vuln IDs
- V-227703
- Rule IDs
- SV-227703r505926_rule
Fix: F-29853r488691_fix
Change the owner of the audio device. # chown root <audio device>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002360
- Vuln IDs
- V-227704
- Rule IDs
- SV-227704r505926_rule
Fix: F-29854r488694_fix
Change the group owner of the audio device. Procedure: # chgrp system <audio device>
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- GEN002680
- Vuln IDs
- V-227716
- Rule IDs
- SV-227716r505926_rule
Fix: F-29866r488733_fix
Change the ownership of the audit log file(s). Procedure: # chown root <audit log file>
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- GEN002690
- Vuln IDs
- V-227717
- Rule IDs
- SV-227717r505926_rule
Fix: F-29867r488736_fix
Change the group ownership of the audit log file(s). Procedure: # chgrp root <audit log file>
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- GEN002700
- Vuln IDs
- V-227718
- Rule IDs
- SV-227718r505926_rule
Fix: F-29868r488739_fix
Change the mode of the audit log directories/files. # chmod 0750 <audit directory> # chmod 0640 <audit file>
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001493
- Version
- GEN002715
- Vuln IDs
- V-227720
- Rule IDs
- SV-227720r505926_rule
Fix: F-29870r488745_fix
Change the owner of the audit tool executable to root. # chown root [audit tool executable]
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001493
- Version
- GEN002716
- Vuln IDs
- V-227721
- Rule IDs
- SV-227721r505926_rule
Fix: F-29871r488748_fix
Change the group-owner of the audit tool executable to root, bin, or sys. Procedure: # chgrp root <audit tool executable>
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001493
- Version
- GEN002717
- Vuln IDs
- V-227722
- Rule IDs
- SV-227722r505926_rule
Fix: F-29872r488751_fix
Change the mode of the audit tool executable to 0750, or less permissive. # chmod 0750 [audit tool executable]
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- GEN002720
- Vuln IDs
- V-227725
- Rule IDs
- SV-227725r505926_rule
Fix: F-29875r488760_fix
Edit /etc/security/audit_control and add the fr or -fr flags to the flags list. Load the new audit configuration. # auditconfig -conf
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- GEN002740
- Vuln IDs
- V-227727
- Rule IDs
- SV-227727r505926_rule
Fix: F-29877r488766_fix
Edit /etc/security/audit_control and add the fd to the flags list. Load the new audit configuration. # auditconfig -conf
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- GEN002760
- Vuln IDs
- V-227732
- Rule IDs
- SV-227732r505926_rule
Fix: F-29882r488781_fix
Edit /etc/security/audit_control and add am to the flags list. Load the new audit configuration. # auditconfig -conf
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- GEN002800
- Vuln IDs
- V-227733
- Rule IDs
- SV-227733r505926_rule
Fix: F-29883r488784_fix
Edit /etc/security/audit_control and add lo to the flags list and naflags list. Load the new audit configuration. # auditconfig -conf
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- GEN002820
- Vuln IDs
- V-227734
- Rule IDs
- SV-227734r505926_rule
Fix: F-29884r488787_fix
Edit /etc/security/audit_control and add fm to the flags list. Load the new audit configuration. # auditconfig -conf
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- GEN002825
- Vuln IDs
- V-227735
- Rule IDs
- SV-227735r505926_rule
Fix: F-29885r488790_fix
Edit /etc/security/audit_control and add the as flag to the flag parameter.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002960
- Vuln IDs
- V-227738
- Rule IDs
- SV-227738r505926_rule
Fix: F-29888r488799_fix
Create /etc/cron.d/cron.allow and/or /etc/cron.d/cron.deny with appropriate content.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN002980
- Vuln IDs
- V-227739
- Rule IDs
- SV-227739r505926_rule
Fix: F-29889r488802_fix
Change the mode of the cron.allow file to 0600. Procedure: # chmod 0600 /etc/cron.d/cron.allow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003080
- Vuln IDs
- V-227746
- Rule IDs
- SV-227746r505926_rule
Fix: F-29896r488823_fix
Change the mode of the crontab files. # chmod 0600 /var/spool/cron/crontabs/*
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003100
- Vuln IDs
- V-227748
- Rule IDs
- SV-227748r505926_rule
Fix: F-29898r488829_fix
Change the mode of the crontab directory. # chmod 0755 /var/spool/cron/crontabs
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003120
- Vuln IDs
- V-227750
- Rule IDs
- SV-227750r505926_rule
Fix: F-29900r488835_fix
Change the owner of the crontab directory. # chown root /var/spool/cron/crontabs
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003140
- Vuln IDs
- V-227751
- Rule IDs
- SV-227751r505926_rule
Fix: F-29901r488838_fix
Change the group owner of the crontab directories to root, sys, or bin. Procedure: # chgrp root /var/spool/cron/crontabs
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- GEN003180
- Vuln IDs
- V-227753
- Rule IDs
- SV-227753r505926_rule
Fix: F-29903r488844_fix
Change the mode of the cron log file. # chmod 0600 /var/cron/log
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN003200
- Vuln IDs
- V-227755
- Rule IDs
- SV-227755r505926_rule
Fix: F-29905r488850_fix
Change the mode of the cron.deny file. # chmod 0600 /etc/cron.d/cron.deny
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003240
- Vuln IDs
- V-227758
- Rule IDs
- SV-227758r505926_rule
Fix: F-29908r488859_fix
# chown root /etc/cron.d/cron.allow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003250
- Vuln IDs
- V-227760
- Rule IDs
- SV-227760r505926_rule
Fix: F-29910r488865_fix
Change the group ownership of the file. Procedure: # chgrp root /etc/cron.d/cron.allow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003252
- Vuln IDs
- V-227761
- Rule IDs
- SV-227761r505926_rule
Fix: F-29911r488868_fix
Change the mode of the file. # chmod 0600 /etc/cron.d/at.deny
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003260
- Vuln IDs
- V-227763
- Rule IDs
- SV-227763r505926_rule
Fix: F-29913r488874_fix
Change the ownership of the cron.deny file to root, sys, or bin. # chown root /etc/cron.d/cron.deny
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003270
- Vuln IDs
- V-227764
- Rule IDs
- SV-227764r505926_rule
Fix: F-29914r488877_fix
Change the group ownership of the file to root, sys, or bin. Procedure: # chgrp root /etc/cron.d/cron.deny
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN003280
- Vuln IDs
- V-227765
- Rule IDs
- SV-227765r505926_rule
Fix: F-29915r488880_fix
Create at.allow and/or at.deny files containing appropriate lists of users to be allowed or denied access to the "at" daemon.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003300
- Vuln IDs
- V-227766
- Rule IDs
- SV-227766r505926_rule
Fix: F-29916r488883_fix
Add appropriate users to the at.deny file, or remove the empty at.deny file if an at.allow file exists.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN003340
- Vuln IDs
- V-227768
- Rule IDs
- SV-227768r505926_rule
Fix: F-29918r489659_fix
Change the mode of the at.allow file. # chmod 0600 /etc/cron.d/at.allow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003460
- Vuln IDs
- V-227776
- Rule IDs
- SV-227776r505926_rule
Fix: F-29926r489683_fix
Change the owner of the at.allow file. # chown root /etc/cron.d/at.allow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003470
- Vuln IDs
- V-227777
- Rule IDs
- SV-227777r505926_rule
Fix: F-29927r489686_fix
Change the group ownership of the file. Procedure: # chgrp root /etc/cron.d/at.allow
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003480
- Vuln IDs
- V-227778
- Rule IDs
- SV-227778r505926_rule
Fix: F-29928r489689_fix
Change the owner of the at.deny file. # chown root /etc/cron.d/at.deny
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003490
- Vuln IDs
- V-227779
- Rule IDs
- SV-227779r505926_rule
Fix: F-29929r489692_fix
Change the group ownership of the at.deny file to root, bin, or sys. Procedure: # chgrp root /etc/cron.d/at.deny
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN003520
- Vuln IDs
- V-227787
- Rule IDs
- SV-227787r505926_rule
Fix: F-29937r489716_fix
Change the owner of the kernel core dump data directory to root. # chown root /var/crash
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003540
- Vuln IDs
- V-227791
- Rule IDs
- SV-227791r505926_rule
Fix: F-29941r503730_fix
This action applies to the global zone only. Determine the type of zone that you are currently securing. # zonename If the command output is "global", this action applies. Edit /etc/system and set the noexec_user_stack parameter to 1. Restart the system for the setting to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003580
- Vuln IDs
- V-227792
- Rule IDs
- SV-227792r505926_rule
Fix: F-29942r489731_fix
Edit /etc/default/inetinit and set the TCP_STRONG_ISS parameter to 2.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003606
- Vuln IDs
- V-227799
- Rule IDs
- SV-227799r505926_rule
Fix: F-29949r489752_fix
Edit /etc/ipf/ipf.conf and add rules to block outgoing source-routed packets, such as: block out log quick all with opt lsrr block out log quick all with opt ssrr Reload the IPF rules. Procedure: # ipf -Fa -A -f /etc/ipf/ipf.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003607
- Vuln IDs
- V-227800
- Rule IDs
- SV-227800r505926_rule
Fix: F-29950r489755_fix
Edit /etc/ipf/ipf.conf and add rules to block incoming source-routed packets, such as: block in log quick all with opt lsrr block in log quick all with opt ssrr Reload the IPF rules. Procedure: # ipf -Fa -A -f /etc/ipf/ipf.conf
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN003624
- Vuln IDs
- V-227807
- Rule IDs
- SV-227807r505926_rule
Fix: F-29957r489779_fix
Migrate the /tmp path onto a separate file system.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003640
- Vuln IDs
- V-227808
- Rule IDs
- SV-227808r505926_rule
Fix: F-29958r503736_fix
Implement file system journaling for the root file system, or use a file system using other mechanisms to ensure consistency. If the root file system supports journaling, enable it. If the file system does not support journaling or another mechanism to ensure consistency, a migration to a different file system will be necessary.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN003740
- Vuln IDs
- V-227814
- Rule IDs
- SV-227814r505926_rule
Fix: F-29964r489800_fix
Change the mode of the inetd.conf file. # chmod 0440 /etc/inet/inetd.conf
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN003760
- Vuln IDs
- V-227816
- Rule IDs
- SV-227816r505926_rule
Fix: F-29966r489806_fix
Change the ownership of the services file to root or bin. Procedure: # chown root /etc/services
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003770
- Vuln IDs
- V-227817
- Rule IDs
- SV-227817r505926_rule
Fix: F-29967r489809_fix
Change the group-owner of the services file. Procedure: # chgrp root /etc/services
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN003780
- Vuln IDs
- V-227818
- Rule IDs
- SV-227818r505926_rule
Fix: F-29968r489812_fix
Change the mode of the services file to 0444 or less permissive. Procedure: # chmod 0444 /etc/services
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- GEN003825
- Vuln IDs
- V-227822
- Rule IDs
- SV-227822r505926_rule
Fix: F-29972r489830_fix
Remove the SUNWrcmdr package. Procedure: # pkgrm SUNWrcmdr
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- GEN003835
- Vuln IDs
- V-227823
- Rule IDs
- SV-227823r505926_rule
Fix: F-29973r489836_fix
Remove the SUNWrcmdr package. Procedure: # pkgrm SUNWrcmdr
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000381
- Version
- GEN003840
- Vuln IDs
- V-227824
- Rule IDs
- SV-227824r505926_rule
Fix: F-29974r489839_fix
# svcadm disable rexec # svcadm refresh inetd
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- GEN003845
- Vuln IDs
- V-227825
- Rule IDs
- SV-227825r505926_rule
Fix: F-29975r489842_fix
Remove the SUNWrcmdr package. Procedure: # pkgrm SUNWrcmdr
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- GEN003850
- Vuln IDs
- V-227826
- Rule IDs
- SV-227826r505926_rule
Fix: F-29976r489845_fix
Disable the telnet daemon. # svcadm disable telnet # svcadm refresh inetd
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN003860
- Vuln IDs
- V-227827
- Rule IDs
- SV-227827r505926_rule
Fix: F-29977r489848_fix
Disable the finger service and restart inetd. Procedure: # svcadm disable finger # svcadm refresh inetd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003960
- Vuln IDs
- V-227832
- Rule IDs
- SV-227832r505926_rule
Fix: F-29982r489869_fix
Change the owner of the traceroute command to root. Example procedure: # chown root /usr/sbin/traceroute
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN003980
- Vuln IDs
- V-227833
- Rule IDs
- SV-227833r505926_rule
Fix: F-29983r489872_fix
Change the group-owner of the traceroute command to root. Procedure: # chgrp root /usr/sbin/traceroute
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN004360
- Vuln IDs
- V-227837
- Rule IDs
- SV-227837r505926_rule
Fix: F-29987r489884_fix
Change the owner of the /etc/mail/aliases file (or equivalent, such as /usr/lib/aliases) to root. Procedure: # chown root /etc/mail/aliases
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN004440
- Vuln IDs
- V-227843
- Rule IDs
- SV-227843r505926_rule
Fix: F-29993r489905_fix
Edit the sendmail.conf file, locate the "O L" or LogLevel entry and change it to 9.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- GEN004460
- Vuln IDs
- V-227844
- Rule IDs
- SV-227844r505926_rule
Fix: F-29994r489908_fix
Edit the syslog.conf file and add a configuration line specifying an appropriate destination for mail.crit syslogs.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN004880
- Vuln IDs
- V-227855
- Rule IDs
- SV-227855r505926_rule
Fix: F-30005r489959_fix
Create a /etc/ftpd/ftpusers file containing a list of accounts not authorized for FTP.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN004920
- Vuln IDs
- V-227857
- Rule IDs
- SV-227857r505926_rule
Fix: F-30007r489965_fix
Change the owner of the ftpusers file to root. # chown root /etc/ftpd/ftpusers
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN004930
- Vuln IDs
- V-227858
- Rule IDs
- SV-227858r505926_rule
Fix: F-30008r489968_fix
Change the group owner of the ftpusers file. Procedure: # chgrp root /etc/ftpusers
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN004940
- Vuln IDs
- V-227859
- Rule IDs
- SV-227859r505926_rule
Fix: F-30009r489971_fix
Change the mode of the ftpusers file to 0640. # chmod 0640 /etc/ftpd/ftpusers
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- GEN005000
- Vuln IDs
- V-227862
- Rule IDs
- SV-227862r505926_rule
Fix: F-30012r489980_fix
Configure anonymous FTP accounts to use a non-functional shell. If necessary, edit the /etc/passwd file to remove any functioning shells associated with the FTP account and replace them with non-functioning shells, such as, /dev/null.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- GEN005080
- Vuln IDs
- V-227865
- Rule IDs
- SV-227865r505926_rule
Fix: F-30015r489989_fix
Edit /etc/inet/inetd.conf and add the -s parameter to TFTPD. # inetconv OR Update the SMF entry for the TFTP daemon. # svccfg -s tftp/udp6 setprop inetd_start/exec = "astring:\"/usr/sbin/in.tftpd -s <other TFTPD options>\""
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-002165
- Version
- GEN005100
- Vuln IDs
- V-227866
- Rule IDs
- SV-227866r505926_rule
Fix: F-30016r489992_fix
Change the mode of the TFTP daemon. Procedure: # chmod 0755 /usr/sbin/in.tftpd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005180
- Vuln IDs
- V-227869
- Rule IDs
- SV-227869r505926_rule
Fix: F-30019r490004_fix
Change the mode of the .Xauthority files. Procedure: # chmod 0600 .Xauthority
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005390
- Vuln IDs
- V-227885
- Rule IDs
- SV-227885r505926_rule
Fix: F-30035r490052_fix
Change the permissions of the syslog configuration file. # chmod 0640 /etc/syslog.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005400
- Vuln IDs
- V-227887
- Rule IDs
- SV-227887r505926_rule
Fix: F-30037r490058_fix
Use the chown command to set the owner to root. # chown root /etc/syslog.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005420
- Vuln IDs
- V-227888
- Rule IDs
- SV-227888r505926_rule
Fix: F-30038r490061_fix
Change the group owner of the /etc/syslog.conf file to root, bin, or sys. Procedure: # chgrp root /etc/syslog.conf
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- GEN005501
- Vuln IDs
- V-227891
- Rule IDs
- SV-227891r505926_rule
Fix: F-30041r490079_fix
Edit the /etc/ssh/ssh_config file and add or edit a Protocol configuration line that does not allow versions less than 2.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005506
- Vuln IDs
- V-227894
- Rule IDs
- SV-227894r510173_rule
Fix: F-30044r510172_fix
Edit /etc/ssh/sshd_config and add or edit the "Ciphers" line. Only include ciphers that start with "3des" or "aes" and do not contain "cbc". For the list of available ciphers for the particular version of your software, consult the sshd_config manpage. Restart the SSH daemon.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005511
- Vuln IDs
- V-227897
- Rule IDs
- SV-227897r505926_rule
Fix: F-30047r490097_fix
Edit /etc/ssh/ssh_config and add or edit the "Ciphers" line. Only include ciphers that start with "3des" or "aes" and do not contain "cbc". For the list of available ciphers for the particular version of your software, consult the ssh_config manpage.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005522
- Vuln IDs
- V-227900
- Rule IDs
- SV-227900r505926_rule
Fix: F-30050r490106_fix
Change the permissions for the SSH public host key files. # chmod 0644 /etc/ssh/*key.pub
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005523
- Vuln IDs
- V-227901
- Rule IDs
- SV-227901r505926_rule
Fix: F-30051r490109_fix
Change the permissions for the SSH private host key files. # chmod 0600 /etc/ssh/*key
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN005524
- Vuln IDs
- V-227902
- Rule IDs
- SV-227902r505926_rule
Fix: F-30052r490112_fix
Edit the SSH daemon configuration and set (add if necessary) a GSSAPIAuthentication directive set to no.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN005525
- Vuln IDs
- V-227903
- Rule IDs
- SV-227903r505926_rule
Fix: F-30053r490115_fix
Edit the SSH client configuration and set (add if necessary) a GSSAPIAuthentication directive set to no.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005539
- Vuln IDs
- V-227906
- Rule IDs
- SV-227906r505926_rule
Fix: F-30056r490124_fix
Edit the SSH daemon configuration and add or edit the Compression setting value to no or delayed.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005540
- Vuln IDs
- V-227907
- Rule IDs
- SV-227907r505926_rule
Fix: F-30057r490127_fix
Add appropriate IP restrictions for SSH to the /etc/hosts.deny and/or /etc/hosts.allow files.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005740
- Vuln IDs
- V-227913
- Rule IDs
- SV-227913r505926_rule
Fix: F-30063r490151_fix
Change the owner of the dfstab file to root. Example: # chown root /etc/dfs/dfstab
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN005750
- Vuln IDs
- V-227914
- Rule IDs
- SV-227914r505926_rule
Fix: F-30064r490154_fix
Change the group ownership of the NFS export configuration file. Procedure: # chgrp root /etc/dfs/dfstab
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN005760
- Vuln IDs
- V-227915
- Rule IDs
- SV-227915r505926_rule
Fix: F-30065r490157_fix
Change the permissions of the dfstab file to 664 or less permissive. # chmod 0644 /etc/dfs/dfstab
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- GEN006060
- Vuln IDs
- V-227924
- Rule IDs
- SV-227924r505926_rule
Fix: F-30074r490190_fix
If there is no functional need for Samba and the daemon is running, disable the daemon by killing the process ID as noted from the output of ps -ef |grep smbd. The utility should also be removed or not installed if there is no functional requirement.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006100
- Vuln IDs
- V-227925
- Rule IDs
- SV-227925r505926_rule
Fix: F-30075r490196_fix
Change the ownership of the smb.conf file. Procedure: # chown root /etc/smb.conf /etc/sfw/smb.conf /etc/samba/smb.conf /etc/sfw/samba/smb.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006120
- Vuln IDs
- V-227926
- Rule IDs
- SV-227926r505926_rule
Fix: F-30076r490199_fix
Change the group owner of the smb.conf file. Procedure: # chgrp root /etc/smb.conf /etc/sfw/smb.conf /etc/samba/smb.conf /etc/sfw/samba/smb.conf
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN006140
- Vuln IDs
- V-227927
- Rule IDs
- SV-227927r505926_rule
Fix: F-30077r490202_fix
Change the mode of the smb.conf file to 0644 or less permissive. Procedure: # chmod 0644 /etc/smb.conf /etc/sfw/smb.conf /etc/samba/smb.conf /etc/sfw/samba/smb.conf
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006160
- Vuln IDs
- V-227929
- Rule IDs
- SV-227929r505926_rule
Fix: F-30079r490208_fix
Use the chown command to configure the smb passwd file. # chown root /etc/sfw/private/smbpasswd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006180
- Vuln IDs
- V-227930
- Rule IDs
- SV-227930r505926_rule
Fix: F-30080r490211_fix
Use the chgrp command to ensure the group owner of the smbpasswd file is root. # chgrp root /etc/sfw/private/smbpasswd
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN006200
- Vuln IDs
- V-227931
- Rule IDs
- SV-227931r505926_rule
Fix: F-30081r490214_fix
Change the mode of the smbpasswd file to 0600. Procedure: # chmod 0600 /etc/sfw/private/smbpasswd
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006225
- Vuln IDs
- V-227934
- Rule IDs
- SV-227934r505926_rule
Fix: F-30084r490223_fix
Edit the smb.conf file and change the security setting to user or another valid setting other than share.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006235
- Vuln IDs
- V-227936
- Rule IDs
- SV-227936r505926_rule
Fix: F-30086r490229_fix
Edit the smb.conf file and change the guest ok setting to no.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- GEN006240
- Vuln IDs
- V-227937
- Rule IDs
- SV-227937r505926_rule
Fix: F-30087r490232_fix
Disable the INN server.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN006260
- Vuln IDs
- V-227938
- Rule IDs
- SV-227938r505926_rule
Fix: F-30088r490235_fix
Change the mode of the /etc/news/hosts.nntp file to 0600. # chmod 0600 /etc/news/hosts.nntp
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN006280
- Vuln IDs
- V-227940
- Rule IDs
- SV-227940r505926_rule
Fix: F-30090r490241_fix
Change the mode of /etc/news/hosts.nntp.nolimit to 0600. # chmod 0600 /etc/news/hosts.nntp.nolimit
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN006300
- Vuln IDs
- V-227942
- Rule IDs
- SV-227942r505926_rule
Fix: F-30092r490247_fix
Change the mode of the /etc/news/nnrp.access file to 0600. # chmod 0600 /etc/news/nnrp.access
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- GEN006320
- Vuln IDs
- V-227944
- Rule IDs
- SV-227944r505926_rule
Fix: F-30094r490253_fix
Change the mode of the /etc/news/passwd.nntp file. # chmod 0600 /etc/news/passwd.nntp
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006340
- Vuln IDs
- V-227946
- Rule IDs
- SV-227946r505926_rule
Fix: F-30096r490259_fix
Change the ownership of the /etc/news directory and the files in it to root. Procedure: # chown -R root /etc/news
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN006360
- Vuln IDs
- V-227947
- Rule IDs
- SV-227947r505926_rule
Fix: F-30097r490262_fix
Change the group owner of the /etc/news directory and the files in it to root. Procedure: # chgrp -R root /etc/news
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- GEN006400
- Vuln IDs
- V-227949
- Rule IDs
- SV-227949r505926_rule
Fix: F-30099r490268_fix
Disable the use of NIS. Possible replacements are NIS+ and LDAP.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN007840
- Vuln IDs
- V-227962
- Rule IDs
- SV-227962r505926_rule
Fix: F-30112r490319_fix
Delete the DHCP client configuration. # rm /etc/dhcp.*
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN008060
- Vuln IDs
- V-227969
- Rule IDs
- SV-227969r505926_rule
Fix: F-30119r490343_fix
Change the permissions of the files. # chmod 0600 /var/ldap/ldap_client_file /var/ldap/ldap_client_cred
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN008080
- Vuln IDs
- V-227970
- Rule IDs
- SV-227970r505926_rule
Fix: F-30120r490346_fix
Change the owner of the files. # chown root /var/ldap/ldap_client_file /var/ldap/ldap_client_cred
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN008100
- Vuln IDs
- V-227971
- Rule IDs
- SV-227971r505926_rule
Fix: F-30121r490349_fix
Change the group-owner of the files to root, bin, or sys. Procedure: # chgrp root /var/ldap/ldap_client_file /var/ldap/ldap_client_cred
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN008440
- Vuln IDs
- V-227976
- Rule IDs
- SV-227976r505926_rule
Fix: F-30126r490367_fix
Stop and disable the autofs service. # svcadm disable autofs
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- GEN008460
- Vuln IDs
- V-227977
- Rule IDs
- SV-227977r505926_rule
Fix: F-30127r490370_fix
Remove the SUNWusb package. # pkgrm SUNWusb
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- GEN008520
- Vuln IDs
- V-227980
- Rule IDs
- SV-227980r505926_rule
Fix: F-30130r490379_fix
Enable the system's local firewall. # svcadm enable network/ipfilter
- RMF Control
- CM-5
- Severity
- L
- CCI
- CCI-001749
- Version
- GEN008800
- Vuln IDs
- V-227986
- Rule IDs
- SV-227986r505926_rule
Fix: F-30136r490418_fix
Edit /var/sadm/install/admin/default and set the authentication setting to quit.