This web site uses advanced JavaScript for several data processing functions. Internet Explorer has severe deficiencies in it's JavaScript engine. Please use a modern day browser, such as Chrome or Edge, in order to take full advantage of this web site.
Solaris 9 SPARC Security Technical Implementation Guide
The Solaris 9 (SPARC) Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]
Vuln
Rule
Version
CCI
Severity
Title
Description
SV-28596r1_rule
GEN000400
CCI-000048
MEDIUM
The Department of Defense (DoD) login banner must be displayed immediately prior to, or as part of, console login prompts.
Failure to display the login banner prior to a logon attempt will negate legal proceedings resulting from unauthorized access to system resources.System AdministratorECWM-1
SV-27094r1_rule
GEN000480
CCI-002238
MEDIUM
The delay between login prompts following a failed login attempt must be at least 4 seconds.
Enforcing a delay between successive failed login attempts increases protection against automated password guessing attacks.
System AdministratorECLO-1, ECLO-2
SV-39820r1_rule
GEN000880
CCI-000366
MEDIUM
The root account must be the only account having an UID of 0.
If an account has an UID of 0, it has root authority. Multiple accounts with an UID of 0 afford more opportunity for potential intruders to guess a password for a privileged account.System AdministratorECLP-1, IAIA-1, IAIA-2
SV-774r2_rule
GEN000900
CCI-000366
LOW
The root user's home directory must not be the root directory (/).
Changing the root home directory to something other than / and assigning it a 0700 protection makes it more difficult for intruders to manipulate the system by reading the files that root places in its default directory. It also gives root the same discretionary access control for root's home directory as for the other plain user home directories.System AdministratorECCD-1, ECCD-2
SV-775r2_rule
GEN000920
CCI-000225
MEDIUM
The root account's home directory (other than /) must have mode 0700.
Permissions greater than 0700 could allow unauthorized users access to the root home directory.System AdministratorECCD-1, ECCD-2
SV-776r2_rule
GEN000940
CCI-000366
MEDIUM
The root account's executable search path must be the vendor default and must contain only absolute paths.
The executable search path (typically the PATH environment variable) contains a list of directories for the shell to search to find executables. If this path includes the current working directory or other relative paths, executables in these directories may be executed instead of system commands. This variable is formatted as a colon-separated list of directories. If there is an empty entry, such as a leading or trailing colon or two consecutive colons, this is interpreted as the current working directory. Entries starting with a slash (/) are absolute paths.System AdministratorECCD-1, ECCD-2, ECSC-1
SV-27143r1_rule
GEN000980
CCI-000770
MEDIUM
The system must prevent the root account from directly logging in except from the system console.
Limiting the root account direct logins to only system consoles protects the root account from direct unauthorized access from a non-console device.
System AdministratorECPA-1, ECSD-2
SV-27069r1_rule
GEN000380
CCI-000366
LOW
All GIDs referenced in the /etc/passwd file must be defined in the /etc/group file.
If a user is assigned the GID of a group not existing on the system, and a group with the same GID is subsequently created, the user may have unintended rights to the group.
System AdministratorECSC-1
SV-788r2_rule
GEN001800
CCI-000225
MEDIUM
All skeleton files (typically those in /etc/skel) must have mode 0644 or less permissive.
If the skeleton files are not protected, unauthorized personnel could change user startup parameters and possibly jeopardize user files.
System AdministratorECLP-1
SV-27166r1_rule
GEN001320
CCI-000225
MEDIUM
NIS/NIS+/yp files must be owned by root, sys, or bin.
NIS/NIS+/yp files are part of the system's identification and authentication processes and are, therefore, critical to system security. Failure to give ownership of sensitive files or utilities to root or bin provides the designated owner and unauthorized users with the potential to access sensitive information or change the system configuration which could weaken the system's security posture.
System AdministratorECLP-1
SV-27171r1_rule
GEN001340
CCI-000225
MEDIUM
NIS/NIS+/yp files must be group-owned by root, sys, or bin.
NIS/NIS+/yp files are part of the system's identification and authentication processes and are, therefore, critical to system security. Failure to give ownership of sensitive files or utilities to root or bin provides the designated owner and unauthorized users with the potential to access sensitive information or change the system configuration which could weaken the system's security posture.
System AdministratorECLP-1
SV-27175r1_rule
GEN001360
CCI-000225
MEDIUM
The NIS/NIS+/yp command files must have mode 0755 or less permissive.
NIS/NIS+/yp files are part of the system's identification and authentication processes and are, therefore, critical to system security. Unauthorized modification of these files could compromise these processes and the system.System AdministratorECLP-1
SV-39821r1_rule
GEN001300
CCI-001499
MEDIUM
Library files must have mode 0755 or less permissive.
Unauthorized access could destroy the integrity of the library files.System AdministratorDCSL-1
SV-796r2_rule
GEN001240
CCI-001499
MEDIUM
System files, programs, and directories must be group-owned by a system group.
Restricting permissions will protect the files from unauthorized modification.System AdministratorECLP-1
SV-39826r1_rule
GEN001400
CCI-000225
MEDIUM
The /etc/shadow (or equivalent) file must be owned by root.
The /etc/shadow file contains the list of local system accounts. It is vital to system security and must be protected from unauthorized modification. Failure to give ownership of sensitive files or utilities to root provides the designated owner and unauthorized users with the potential to access sensitive information or change the system configuration which could weaken the system's security posture.System AdministratorECLP-1
SV-798r2_rule
GEN001380
CCI-000225
MEDIUM
The /etc/passwd file must have mode 0644 or less permissive.
If the password file is writable by a group owner or the world, the risk of password file compromise is increased. The password file contains the list of accounts on the system and associated information.System AdministratorECLP-1
SV-800r2_rule
GEN001420
CCI-000225
MEDIUM
The /etc/shadow (or equivalent) file must have mode 0400.
The /etc/shadow file contains the list of local system accounts. It is vital to system security and must be protected from unauthorized modification. The file also contains password hashes which must not be accessible to users other than root.System AdministratorECLP-1
SV-27266r1_rule
GEN002660
CCI-000169
MEDIUM
Auditing must be implemented.
Without auditing, individual system accesses cannot be tracked and malicious activity cannot be detected and traced back to an individual account. System AdministratorECAR-1, ECAR-2, ECAR-3
SV-27271r1_rule
GEN002680
CCI-000162
MEDIUM
System audit logs must be owned by root.
Failure to give ownership of system audit log files to root provides the designated owner and unauthorized users with the potential to access sensitive information.System AdministratorECTP-1
SV-27282r1_rule
GEN002700
CCI-000163
MEDIUM
System audit logs must have mode 0640 or less permissive.
If a user can write to the audit logs, audit trails can be modified or destroyed and system intrusion may not be detected. System audit logs are those files generated from the audit system and do not include activity, error, or other log files created by application software.System AdministratorECTP-1
SV-27287r1_rule
GEN002720
CCI-000126
MEDIUM
The audit system must be configured to audit failed attempts to access files and programs.
If the system is not configured to audit certain activities and write them to an audit log, it is more difficult to detect and track system compromises and damages incurred during a system compromise.
System AdministratorECAR-1, ECAR-2, ECAR-3
SV-27292r1_rule
GEN002740
CCI-000126
MEDIUM
The audit system must be configured to audit file deletions.
If the system is not configured to audit certain activities and write them to an audit log, it is more difficult to detect and track system compromises and damages incurred during a system compromise.
System AdministratorECAR-1, ECAR-2, ECAR-3
SV-27303r1_rule
GEN002800
CCI-000126
MEDIUM
The audit system must be configured to audit login, logout, and session initiation.
If the system is not configured to audit certain activities and write them to an audit log, it is more difficult to detect and track system compromises and damages incurred during a system compromise.
System AdministratorECAR-1, ECAR-2, ECAR-3
SV-27309r1_rule
GEN002820
CCI-000126
MEDIUM
The audit system must be configured to audit all discretionary access control permission modifications.
If the system is not configured to audit certain activities and write them to an audit log, it is more difficult to detect and track system compromises and damages incurred during a system compromise.
System AdministratorECAR-1, ECAR-2, ECAR-3
SV-39885r1_rule
GEN003740
CCI-000225
MEDIUM
The inetd.conf file must have mode 0440 or less permissive.
The Internet service daemon configuration files must be protected as malicious modification could cause Denial of Service or increase the attack surface of the system.System AdministratorECLP-1
SV-823r2_rule
GEN003760
CCI-000225
MEDIUM
The services file must be owned by root or bin.
Failure to give ownership of sensitive files or utilities to root or bin provides the designated owner and unauthorized users with the potential to access sensitive information or change the system configuration which could weaken the system's security posture.System AdministratorECLP-1
SV-824r2_rule
GEN003780
CCI-000225
MEDIUM
The services file must have mode 0444 or less permissive.
The services file is critical to the proper operation of network services and must be protected from unauthorized modification. Unauthorized modification could result in the failure of network services.System AdministratorECLP-1
SV-39828r1_rule
GEN001780
CCI-000366
LOW
Global initialization files must contain the mesg -n or mesg n commands.
If the mesg -n or mesg n command is not placed into the system profile, messaging can be used to cause a Denial of Service attack.System AdministratorECSC-1
SV-835r2_rule
GEN004440
CCI-000366
LOW
Sendmail logging must not be set to less than nine in the sendmail.cf file.
If Sendmail is not configured to log at level 9, system logs may not contain the information necessary for tracking unauthorized use of the Sendmail service.System AdministratorECAR-1, ECAR-2, ECAR-3
SV-41546r1_rule
GEN004460
CCI-000126
MEDIUM
The system syslog service must log informational and more severe SMTP service messages.
If informational and more severe SMTP service messages are not logged, malicious activity on the system may go unnoticed.System AdministratorECAR-1, ECAR-2, ECAR-3, ECSC-1
SV-28404r1_rule
GEN004880
CCI-000225
MEDIUM
The ftpusers file must exist.
The ftpusers file contains a list of accounts not allowed to use FTP to transfer files. If this file does not exist, then unauthorized accounts can utilize FTP.
System AdministratorECCD-1, ECCD-2
SV-28410r1_rule
GEN004920
CCI-000225
MEDIUM
The ftpusers file must be owned by root.
If the file ftpusers is not owned by root, an unauthorized user may modify the file to allow unauthorized accounts to use FTP.
System AdministratorECLP-1
SV-28413r1_rule
GEN004940
CCI-000225
MEDIUM
The ftpusers file must have mode 0640 or less permissive.
Excessive permissions on the ftpusers file could permit unauthorized modification. Unauthorized modification could result in Denial of Service to authorized FTP users or permit unauthorized users to access the FTP service.System AdministratorECLP-1
SV-867r2_rule
GEN006400
CCI-001435
MEDIUM
The Network Information System (NIS) protocol must not be used.
Due to numerous security vulnerabilities existing within NIS, it must not be used. Possible alternative directory services are NIS+ and LDAP.System AdministratorInformation Assurance OfficerECSC-1
SV-27184r1_rule
GEN001440
CCI-000225
LOW
All interactive users must be assigned a home directory in the /etc/passwd file.
If users do not have a valid home directory, there is no place for the storage and control of files they own.System AdministratorECSC-1
SV-27192r1_rule
GEN001460
CCI-000225
LOW
All interactive user home directories defined in the /etc/passwd file must exist.
If a user has a home directory defined that does not exist, the user may be given the / directory, by default, as the current working directory upon logon. This could create a Denial of Service because the user would not be able to perform useful tasks in this location.System AdministratorECSC-1
SV-39837r2_rule
GEN001600
CCI-000366
MEDIUM
Run control scripts' executable search paths must contain only absolute paths.
The executable search path (typically the PATH environment variable) contains a list of directories for the shell to search to find executables. If this path includes the current working directory or other relative paths, executables in these directories may be executed instead of system commands. This variable is formatted as a colon-separated list of directories. If there is an empty entry, such as a leading or trailing colon or two consecutive colons, this is interpreted as the current working directory. Paths starting with a slash (/) are absolute paths.System AdministratorECCD-1, ECCD-2
SV-40806r1_rule
GEN002120
CCI-000366
MEDIUM
The /etc/shells (or equivalent) file must exist.
The shells file (or equivalent) lists approved default shells. It helps provide layered defense to the security approach by ensuring users cannot change their default shell to an unauthorized shell that may not be secure.System AdministratorECSC-1
SV-28444r1_rule
GEN005740
CCI-000225
MEDIUM
The NFS export configuration file must be owned by root.
Failure to give ownership of the NFS export configuration file to root provides the designated owner and possible unauthorized users with the potential to change system configuration which could weaken the system's security posture.System AdministratorECLP-1
SV-28446r1_rule
GEN005760
CCI-000225
LOW
The NFS export configuration file must have mode 0644 or less permissive.
Excessive permissions on the NFS export configuration file could allow unauthorized modification of the file, which could result in Denial of Service to authorized NFS exports and the creation of additional unauthorized exports.System AdministratorECCD-1, ECCD-2, ECLP-1
SV-955r2_rule
GEN000000-SOL00220
CCI-000032
MEDIUM
The /usr/aset/userlist file must exist.
If the userlist file does not exist, then an unauthorized user may exist in the /etc/passwd file.System AdministratorECSC-1
SV-956r2_rule
GEN000000-SOL00240
CCI-000225
MEDIUM
The /usr/aset/userlist file must be owned by root.
If the userlist file is not owned by root, then an unauthorized user can modify the file and enter an unauthorized user.System AdministratorECLP-1
SV-957r2_rule
GEN000000-SOL00260
CCI-000225
MEDIUM
The /usr/aset/userlist file must have mode 0600 or less permissive.
A permission mask not set to the required level could allow unauthorized access to sensitive system files and resources.System AdministratorECLP-1
SV-27317r1_rule
GEN002960
CCI-000225
MEDIUM
Access to the cron utility must be controlled using the cron.allow and/or cron.deny file(s).
The cron facility allows users to execute recurring jobs on a regular and unattended basis. The cron.allow file designates accounts allowed to enter and execute jobs using the cron facility. If neither cron.allow nor cron.deny exists, then any account may use the cron facility. This may open the facility up for abuse by system intruders and malicious users.System AdministratorECLP-1
SV-27323r1_rule
GEN002980
CCI-000225
MEDIUM
The cron.allow file must have mode 0600 or less permissive.
A cron.allow file that is readable and/or writable by other than root could allow potential intruders and malicious users to use the file contents to help discern information, such as who is allowed to execute cron programs, which could be harmful to overall system and network security.System AdministratorECLP-1
SV-27340r1_rule
GEN003080
CCI-000225
MEDIUM
Crontab files must have mode 0600 or less permissive.
To protect the integrity of scheduled system jobs and prevent malicious modification to these jobs, crontab files must be secured.
System AdministratorECLP-1
SV-27342r1_rule
GEN003100
CCI-000225
MEDIUM
Cron and crontab directories must have mode 0755 or less permissive.
To protect the integrity of scheduled system jobs and to prevent malicious modification to these jobs, crontab files must be secured.
System AdministratorECLP-1
SV-27345r1_rule
GEN003120
CCI-000225
MEDIUM
Cron and crontab directories must be owned by root or bin.
Incorrect ownership of the cron or crontab directories could permit unauthorized users the ability to alter cron jobs and run automated jobs as privileged users. Failure to give ownership of cron or crontab directories to root or to bin provides the designated owner and unauthorized users with the potential to access sensitive information or change the system configuration which could weaken the system's security posture.System AdministratorECLP-1
SV-27347r1_rule
GEN003140
CCI-000225
MEDIUM
Cron and crontab directories must be group-owned by root, sys, or bin.
To protect the integrity of scheduled system jobs and to prevent malicious modification to these jobs, crontab files must be secured. Failure to give group-ownership of cron or crontab directories to a system group provides the designated group and unauthorized users with the potential to access sensitive information or change the system configuration which could weaken the system's security posture.System AdministratorECLP-1
SV-27354r1_rule
GEN003180
CCI-000225
MEDIUM
The cronlog file must have mode 0600 or less permissive.
Cron logs contain reports of scheduled system activities and must be protected from unauthorized access or manipulation.
System AdministratorECLP-1, ECTP-1
SV-27376r1_rule
GEN003280
CCI-000225
MEDIUM
Access to the at utility must be controlled via the at.allow and/or at.deny file(s).
The at facility selectively allows users to execute jobs at deferred times. It is usually used for one-time jobs. The at.allow file selectively allows access to the at facility. If there is no at.allow file, there is no ready documentation of who is allowed to submit at jobs.System AdministratorECLP-1
SV-27380r1_rule
GEN003300
CCI-000225
MEDIUM
The at.deny file must not be empty if it exists.
On some systems, if there is no at.allow file and there is an empty at.deny file, then the system assumes everyone has permission to use the at facility. This could create an insecure setting in the case of malicious users or system intruders.trueSystem AdministratorInformation Assurance OfficerECLP-1
SV-27388r1_rule
GEN003340
CCI-000225
MEDIUM
The at.allow file must have mode 0600 or less permissive.
Permissions more permissive than 0600 (read and write for the owner) may allow unauthorized or malicious access to the at.allow and/or at.deny files.System AdministratorECLP-1
SV-1023r2_rule
GEN006240
CCI-000381
MEDIUM
The system must not run an Internet Network News (INN) server.
Internet Network News (INN) servers access Usenet newsfeeds and store newsgroup articles. INN servers use the Network News Transfer Protocol (NNTP) to transfer information from the Usenet to the server and from the server to authorized remote hosts.
If this function is necessary to support a valid mission requirement, its use must be authorized and approved in the system accreditation package.System AdministratorInformation Assurance OfficerECSC-1
SV-39811r1_rule
GEN001120
CCI-000770
MEDIUM
The system must not permit root logins using remote access programs such as SSH.
Even though communications are encrypted, an additional layer of security may be gained by extending the policy of not logging directly on as root. In addition, logging in with a user-specific account preserves the audit trail.System AdministratorECPA-1
SV-27246r1_rule
GEN002340
CCI-000225
MEDIUM
Audio devices must be owned by root.
Globally Accessible audio and video devices have proven to be security hazards. There is software that can activate system microphones and video devices connected to user workstations and/or X terminals. Once the microphone has been activated, it is possible to eavesdrop on otherwise private conversations without the victim being aware of it. This action effectively changes the user's microphone to a bugging device.System AdministratorECLP-1
SV-39890r1_rule
GEN006120
CCI-000225
MEDIUM
The smb.conf file must be group-owned by root, bin, or sys.
If the group owner of the smb.conf file is not root or a system group, the file may be maliciously modified and the Samba configuration could be compromised.System AdministratorECLP-1
SV-27251r1_rule
GEN002360
CCI-000225
MEDIUM
Audio devices must be group-owned by root, sys, or bin.
Without privileged group owners, audio devices will be vulnerable to being used as eaves-dropping devices by malicious users or intruders to possibly listen to conversations containing sensitive information.
System AdministratorECLP-1
SV-27207r1_rule
GEN001660
CCI-000225
MEDIUM
All system start-up files must be owned by root.
System start-up files not owned by root could lead to system compromise by allowing malicious users or applications to modify them for unauthorized purposes. This could lead to system and network compromise.
System AdministratorECLP-1
SV-27213r1_rule
GEN001680
CCI-000225
MEDIUM
All system start-up files must be group-owned by root, sys, or bin.
If system start-up files do not have a group owner of root or a system group, the files may be modified by malicious users or intruders.System AdministratorECLP-1
SV-4245r2_rule
GEN000000-SOL00100
CCI-000225
MEDIUM
The /etc/security/audit_user file must have mode 0640 or less permissive.
Audit_user is a sensitive file that, if compromised, would allow a malicious user to select auditing parameters to ignore his sessions. This would allow malicious operations the auditing subsystem would not log for that user.System AdministratorECLP-1
SV-4273r2_rule
GEN006260
CCI-000225
MEDIUM
The /etc/news/hosts.nntp (or equivalent) must have mode 0600 or less permissive.
Excessive permissions on the hosts.nntp file may allow unauthorized modification which could lead to Denial-of-Service to authorized users or provide access to unauthorized users.System AdministratorECLP-1
SV-4274r2_rule
GEN006280
CCI-000225
MEDIUM
The /etc/news/hosts.nntp.nolimit (or equivalent) must have mode 0600 or less permissive.
Excessive permissions on the hosts.nntp.nolimit file may allow unauthorized modification which could lead to Denial-of-Service to authorized users or provide access to unauthorized users.System AdministratorECLP-1
SV-4275r2_rule
GEN006300
CCI-000225
MEDIUM
The /etc/news/nnrp.access (or equivalent) must have mode 0600 or less permissive.
Excessive permissions on the nnrp.access file may allow unauthorized modification which could lead to Denial-of-Service to authorized users or provide access to unauthorized users.System AdministratorECLP-1
SV-4276r2_rule
GEN006320
CCI-000225
MEDIUM
The /etc/news/passwd.nntp file (or equivalent) must have mode 0600 or less permissive.
File permissions more permissive than 0600 for /etc/news/passwd.nntp may allow access to privileged information by system intruders or malicious users.System AdministratorECLP-1
SV-39817r1_rule
GEN005500
CCI-001436
HIGH
The SSH daemon must be configured to only use the SSHv2 protocol.
SSHv1 is not a DoD-approved protocol and has many well-known vulnerability exploits. Exploits of the SSH daemon could provide immediate root access to the system.System AdministratorDCPP-1, ECSC-1
SV-4321r2_rule
GEN006060
CCI-001436
MEDIUM
The system must not run Samba unless needed.
Samba is a tool used for the sharing of files and printers between Windows and UNIX operating systems. It provides access to sensitive files and, therefore, poses a security risk if compromised.System AdministratorDCPD-1, ECSC-1
SV-4351r2_rule
GEN000000-SOL00080
CCI-000225
MEDIUM
The /etc/security/audit_user file must be group-owned by root, sys, or bin.
The Solaris audit_user file allows for selective auditing or non-auditing of features for certain users. If it is not protected, it could be compromised and used to mask audit events. This could cause the loss of valuable forensics data in the case of a system compromise.System AdministratorECLP-1
SV-4352r2_rule
GEN000000-SOL00060
CCI-000225
MEDIUM
The /etc/security/audit_user file must be owned by root.
The /etc/security/audit_user is a sensitive file and must be owned by root to prevent possible system compromise.System AdministratorECLP-1
SV-27359r1_rule
GEN003200
CCI-000225
MEDIUM
The cron.deny file must have mode 0600 or less permissive.
If file permissions for cron.deny are more permissive than 0600, sensitive information could be viewed or edited by unauthorized users.
System AdministratorECLP-1
SV-27366r1_rule
GEN003240
CCI-000225
MEDIUM
The cron.allow file must be owned by root, bin, or sys.
If the owner of the cron.allow file is not set to root, bin, or sys, the possibility exists for an unauthorized user to view or to edit sensitive information.System AdministratorECLP-1
SV-27392r1_rule
GEN003460
CCI-000225
MEDIUM
The at.allow file must be owned by root, bin, or sys.
If the owner of the at.allow file is not set to root, bin, or sys, unauthorized users could be allowed to view or edit sensitive information contained within the file.System AdministratorECLP-1
SV-27396r1_rule
GEN003480
CCI-000225
MEDIUM
The at.deny file must be owned by root, bin, or sys.
If the owner of the at.deny file is not set to root, bin, or sys, unauthorized users could be allowed to view or edit sensitive information contained within the file.System AdministratorECLP-1
SV-28392r1_rule
GEN003960
CCI-000225
MEDIUM
The traceroute command owner must be root.
If the traceroute command owner has not been set to root, an unauthorized user could use this command to obtain knowledge of the network topology inside the firewall. This information may allow an attacker to determine trusted routers and other network information possibly leading to system and network compromise.System AdministratorECLP-1
SV-28395r1_rule
GEN003980
CCI-000225
MEDIUM
The traceroute command must be group-owned by sys, bin, or root.
If the group owner of the traceroute command has not been set to a system group, unauthorized users could have access to the command and use it to gain information regarding a network's topology inside of the firewall. This information may allow an attacker to determine trusted routers and other network information possibly leading to system and network compromise.System AdministratorECLP-1
SV-4387r2_rule
GEN005000
CCI-000225
HIGH
Anonymous FTP accounts must not have a functional shell.
If an anonymous FTP account has been configured to use a functional shell, attackers could gain access to the shell if the account is compromised.System AdministratorECCD-1, ECCD-2
SV-4393r2_rule
GEN005400
CCI-000225
MEDIUM
The /etc/syslog.conf file must be owned by root.
If the /etc/syslog.conf file is not owned by root, unauthorized users could be allowed to view, edit, or delete important system messages handled by the syslog facility.System AdministratorECLP-1
SV-39892r1_rule
GEN005420
CCI-000225
MEDIUM
The /etc/syslog.conf file must be group-owned by root, bin, or sys.
If the group owner of /etc/syslog.conf is not root, bin, or sys, unauthorized users could be permitted to view, edit, or delete important system messages handled by the syslog facility.System AdministratorECLP-1
SV-27371r1_rule
GEN003260
CCI-000225
MEDIUM
The cron.deny file must be owned by root, bin, or sys.
Cron daemon control files restrict the scheduling of automated tasks and must be protected.
System AdministratorECLP-1
SV-12485r2_rule
GEN001820
CCI-000225
MEDIUM
All skeleton files and directories (typically in /etc/skel) must be owned by bin.
If the skeleton files are not protected, unauthorized personnel could change user startup parameters and possibly jeopardize user files. Failure to give ownership of sensitive files or utilities to bin provides the designated owner and unauthorized users with the potential to access sensitive information or change the system configuration which could weaken the system's security posture.System AdministratorECLP-1
SV-12486r2_rule
GEN001840
CCI-000366
MEDIUM
All global initialization files' executable search paths must contain only absolute paths.
The executable search path (typically the PATH environment variable) contains a list of directories for the shell to search to find executables. If this path includes the current working directory or other relative paths, executables in these directories may be executed instead of system commands. This variable is formatted as a colon-separated list of directories. If there is an empty entry, such as a leading or trailing colon, or two consecutive colons, this is interpreted as the current working directory. Paths starting with a slash (/) are absolute paths.System AdministratorECCD-1, ECCD-2
SV-27407r1_rule
GEN003520
CCI-000225
LOW
The kernel core dump data directory must be owned by root.
Kernel core dumps may contain the full contents of system memory at the time of the crash. As the system memory may contain sensitive information, it must be protected accordingly. If the kernel core dump data directory is not owned by root, the core dumps contained in the directory may be subject to unauthorized access.System AdministratorECLP-1
SV-27412r1_rule
GEN003540
CCI-000366
MEDIUM
The system must implement non-executable program stacks.
A common type of exploit is the stack buffer overflow. An application receives, from an attacker, more data than it is prepared for and stores this information on its stack, writing beyond the space reserved for it. This can be designed to cause execution of the data written on the stack. One mechanism to mitigate this vulnerability is for the system to not allow the execution of instructions in sections of memory identified as part of the stack.System AdministratorECCD-1, ECCD-2, ECSC-1
SV-27416r1_rule
GEN003580
CCI-001436
MEDIUM
The system must use initial TCP sequence numbers most resistant to sequence number guessing attacks.
One use of initial TCP sequence numbers is to verify bidirectional communication between two hosts, which provides some protection against spoofed source addresses being used by the connection originator. If the initial TCP sequence numbers for a host can be determined by an attacker, it may be possible to establish a TCP connection from a spoofed source address without bidirectional communication.System AdministratorECSC-1
SV-28618r1_rule
GEN003620
CCI-001208
LOW
A separate file system must be used for user home directories (such as /home or equivalent).
The use of separate file systems for different paths can protect the system from failures resulting from a file system becoming full or failing.trueSystem AdministratorECSC-1
SV-12515r2_rule
GEN005180
CCI-000225
MEDIUM
All .Xauthority files must have mode 0600 or less permissive.
.Xauthority files ensure the user is authorized to access the specific X Windows host. Excessive permissions may permit unauthorized modification of these files, which could lead to Denial of Service to authorized access or allow unauthorized access to be obtained.System AdministratorECLP-1
SV-41532r1_rule
GEN006620
CCI-000366
MEDIUM
The system's access control program must be configured to grant or deny system access to specific hosts.
If the system's access control program is not configured with appropriate rules for allowing and denying access to system network resources, services may be accessible to unauthorized hosts.System AdministratorECCD-1, ECCD-2, ECSC-1
SV-12532r2_rule
GEN000000-SOL00020
CCI-000225
MEDIUM
The nosuid option must be configured in the /etc/rmmount.conf file.
The rmmount.conf file controls the mounting of removable media on a Solaris system. Removable media is not to be trusted with privileged access, and therefore the filesystems must be mounted with the nosuid option, which prevents any executables with the setuid bit set on this filesystem from running with owner privileges.System AdministratorECPA-1
SV-12534r2_rule
GEN000000-SOL00440
CCI-000225
HIGH
The root account must be the only account with GID of 0.
Accounts with a GID of 0 have root group privileges.System AdministratorIAIA-1, IAIA-2
SV-26293r1_rule
GEN000250
CCI-000225
MEDIUM
The time synchronization configuration file (such as /etc/ntp.conf) must be owned by root.
A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit records with other systems. If an illicit time source is used for synchronization, the integrity of system logs and the security of the system could be compromised. If the configuration files controlling time synchronization are not owned by a system account, unauthorized modifications could result in the failure of time synchronization.System AdministratorECLP-1
SV-26296r1_rule
GEN000251
CCI-000225
MEDIUM
The time synchronization configuration file (such as /etc/ntp.conf) must be group-owned by root, bin, or sys.
A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit records with other systems. If an illicit time source is used for synchronization, the integrity of system logs and the security of the system could be compromised. If the configuration files controlling time synchronization are not owned by a system group, unauthorized modifications could result in the failure of time synchronization.System AdministratorECLP-1
SV-26298r1_rule
GEN000252
CCI-000225
MEDIUM
The time synchronization configuration file (such as /etc/ntp.conf) must have mode 0640 or less permissive.
A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit records with other systems. If an illicit time source is used for synchronization, the integrity of system logs and the security of the system could be compromised. If the configuration files controlling time synchronization are not protected, unauthorized modifications could result in the failure of time synchronization.System AdministratorECLP-1
SV-26355r1_rule
GEN000945
CCI-000366
MEDIUM
The root account's library search path must be the system default and must contain only absolute paths.
The library search path environment variable(s) contain a list of directories for the dynamic linker to search to find libraries. If this path includes the current working directory or other relative paths, libraries in these directories may be loaded instead of system libraries. This variable is formatted as a colon-separated list of directories. If there is an empty entry, such as a leading or trailing colon or two consecutive colons, this is interpreted as the current working directory. Entries starting with a slash (/) are absolute paths.System AdministratorECSC-1
SV-26357r1_rule
GEN000950
CCI-000366
MEDIUM
The root account's list of preloaded libraries must be empty.
The library preload list environment variable contains a list of libraries for the dynamic linker to load before loading the libraries required by the binary. If this list contains paths to libraries relative to the current working directory, unintended libraries may be preloaded. This variable is formatted as a space-separated list of libraries. Paths starting with (/) are absolute paths.System AdministratorECSC-1
SV-26395r1_rule
GEN001362
CCI-000225
MEDIUM
The /etc/resolv.conf file must be owned by root.
The resolv.conf (or equivalent) file configures the system's DNS resolver. DNS is used to resolve host names to IP addresses. If DNS configuration is modified maliciously, host name resolution may fail or return incorrect information. DNS may be used by a variety of system security functions, such as time synchronization, centralized authentication, and remote system logging.
System AdministratorECLP-1
SV-39894r1_rule
GEN001363
CCI-000225
MEDIUM
The /etc/resolv.conf file must be group-owned by root, bin, or sys.
The resolv.conf (or equivalent) file configures the system's DNS resolver. DNS is used to resolve host names to IP addresses. If DNS configuration is modified maliciously, host name resolution may fail or return incorrect information. DNS may be used by a variety of system security functions such as time synchronization, centralized authentication, and remote system logging.System AdministratorECLP-1
SV-26397r1_rule
GEN001364
CCI-000225
MEDIUM
The /etc/resolv.conf file must have mode 0644 or less permissive.
The resolv.conf (or equivalent) file configures the system's DNS resolver. DNS is used to resolve host names to IP addresses. If DNS configuration is modified maliciously, host name resolution may fail or return incorrect information. DNS may be used by a variety of system security functions, such as time synchronization, centralized authentication, and remote system logging.System AdministratorECLP-1
SV-26410r1_rule
GEN001366
CCI-000225
MEDIUM
The /etc/hosts file must be owned by root.
The /etc/hosts file (or equivalent) configures local host name to IP address mappings that typically take precedence over DNS resolution. If this file is maliciously modified, it could cause the failure or compromise of security functions requiring name resolution, which may include time synchronization, centralized authentication, and remote system logging.System AdministratorECLP-1
SV-39896r1_rule
GEN001367
CCI-000225
MEDIUM
The /etc/hosts file must be group-owned by root, bin, or sys.
The /etc/hosts file (or equivalent) configures local host name to IP address mappings that typically take precedence over DNS resolution. If this file is maliciously modified, it could cause the failure or compromise of security functions requiring name resolution, which may include time synchronization, centralized authentication, and remote system logging.System AdministratorECLP-1
SV-26412r1_rule
GEN001368
CCI-000225
MEDIUM
The /etc/hosts file must have mode 0644 or less permissive.
The /etc/hosts file (or equivalent) configures local host name to IP address mappings that typically take precedence over DNS resolution. If this file is maliciously modified, it could cause the failure or compromise of security functions requiring name resolution, which may include time synchronization, centralized authentication, and remote system logging.System AdministratorECLP-1
SV-26417r1_rule
GEN001371
CCI-000225
MEDIUM
The /etc/nsswitch.conf file must be owned by root.
The nsswitch.conf file (or equivalent) configures the source of a variety of system security information including account, group, and host lookups. Malicious changes could prevent the system from functioning or compromise system security.System AdministratorECLP-1
SV-39897r1_rule
GEN001372
CCI-000225
MEDIUM
The /etc/nsswitch.conf file must be group-owned by root, bin, or sys.
The nsswitch.conf file (or equivalent) configures the source of a variety of system security information including account, group, and host lookups. Malicious changes could prevent the system from functioning or compromise system security.System AdministratorECLP-1
SV-26419r1_rule
GEN001373
CCI-000225
MEDIUM
The /etc/nsswitch.conf file must have mode 0644 or less permissive.
The nsswitch.conf file (or equivalent) configures the source of a variety of system security information including account, group, and host lookups. Malicious changes could prevent the system from functioning or compromise system security.System AdministratorECLP-1
SV-26425r1_rule
GEN001378
CCI-000225
MEDIUM
The /etc/passwd file must be owned by root.
The /etc/passwd file contains the list of local system accounts. It is vital to system security and must be protected from unauthorized modification.System AdministratorECLP-1
SV-39898r1_rule
GEN001379
CCI-000225
MEDIUM
The /etc/passwd file must be group-owned by root, bin, or sys.
The /etc/passwd file contains the list of local system accounts. It is vital to system security and must be protected from unauthorized modification.System AdministratorECLP-1
SV-26431r1_rule
GEN001391
CCI-000225
MEDIUM
The /etc/group file must be owned by root.
The /etc/group file is critical to system security and must be owned by a privileged user. The group file contains a list of system groups and associated information.System AdministratorECLP-1
SV-39899r1_rule
GEN001392
CCI-000225
MEDIUM
The /etc/group file must be group-owned by root, bin, or sys.
The /etc/group file is critical to system security and must be protected from unauthorized modification. The group file contains a list of system groups and associated information.System AdministratorECLP-1
SV-26433r1_rule
GEN001393
CCI-000225
MEDIUM
The /etc/group file must have mode 0644 or less permissive.
The /etc/group file is critical to system security and must be protected from unauthorized modification. The group file contains a list of system groups and associated information.System AdministratorECLP-1
SV-39900r1_rule
GEN001410
CCI-000225
MEDIUM
The /etc/shadow file (or equivalent) must be group-owned by root, bin, or sys.
The /etc/shadow file contains the list of local system accounts. It is vital to system security and must be protected from unauthorized modification. The file also contains password hashes which must not be accessible to users other than root.System AdministratorECLP-1
SV-26467r1_rule
GEN001470
CCI-000201
MEDIUM
The /etc/passwd file must not contain password hashes.
If password hashes are readable by non-administrators, the passwords are subject to attack through lookup tables or cryptographic weaknesses in the hashes.System AdministratorECLP-1
SV-26447r1_rule
GEN001475
CCI-000225
MEDIUM
The /etc/group file must not contain any group password hashes.
Group passwords are typically shared and should not be used. Additionally, if password hashes are readable by non-administrators, the passwords are subject to attack through lookup tables or cryptographic weaknesses in the hashes.System AdministratorECLP-1
SV-39901r1_rule
GEN001830
CCI-000225
MEDIUM
All skeleton files (typically in /etc/skel) must be group-owned by root, bin, or sys.
If the skeleton files are not protected, unauthorized personnel could change user startup parameters and possibly jeopardize user files.System AdministratorECLP-1
SV-26505r1_rule
GEN002715
CCI-001493
LOW
System audit tool executables must be owned by root.
To prevent unauthorized access or manipulation of system audit logs, the tools for manipulating those logs must be protected.System AdministratorECLP-1
SV-26508r1_rule
GEN002716
CCI-001493
LOW
System audit tool executables must be group-owned by root, bin, or sys.
To prevent unauthorized access or manipulation of system audit logs, the tools for manipulating those logs must be protected.System AdministratorECLP-1
SV-26511r1_rule
GEN002717
CCI-001493
LOW
System audit tool executables must have mode 0750 or less permissive.
To prevent unauthorized access or manipulation of system audit logs, the tools for manipulating those logs must be protected.System AdministratorECLP-1
SV-26524r1_rule
GEN002825
CCI-000126
MEDIUM
The audit system must be configured to audit the loading and unloading of dynamic kernel modules.
Actions concerning dynamic kernel modules must be recorded as they are substantial events. Dynamic kernel modules can increase the attack surface of a system. A malicious kernel module can be used to substantially alter the functioning of a system, often with the purpose of hiding a compromise from the SA.System AdministratorECAR-1
SV-26553r1_rule
GEN003250
CCI-000225
MEDIUM
The cron.allow file must be group-owned by root, bin, or sys.
If the group of the cron.allow is not set to root, bin, or sys, the possibility exists for an unauthorized user to view or edit the list of users permitted to use cron. Unauthorized modification of this file could cause Denial of Service to authorized cron users or provide unauthorized users with the ability to run cron jobs.System AdministratorECLP-1
SV-26556r1_rule
GEN003252
CCI-000225
MEDIUM
The at.deny file must have mode 0600 or less permissive.
The at daemon control files restrict access to scheduled job manipulation and must be protected. Unauthorized modification of the at.deny file could result in Denial of Service to authorized at users or provide unauthorized users with the ability to run at jobs.System AdministratorECLP-1
SV-26563r1_rule
GEN003270
CCI-000225
MEDIUM
The cron.deny file must be group-owned by root, bin, or sys.
Cron daemon control files restrict the scheduling of automated tasks and must be protected. Unauthorized modification of the cron.deny file could result in Denial of Service to authorized cron users or could provide unauthorized users with the ability to run cron jobs.System AdministratorECLP-1
SV-26570r1_rule
GEN003470
CCI-000225
MEDIUM
The at.allow file must be group-owned by root, bin, or sys.
If the group owner of the at.allow file is not set to root, bin, or sys, unauthorized users could be allowed to view or edit the list of users permitted to run at jobs. Unauthorized modification could result in Denial of Service to authorized at users or provide unauthorized users with the ability to run at jobs.System AdministratorECLP-1
SV-26573r1_rule
GEN003490
CCI-000225
MEDIUM
The at.deny file must be group-owned by root, bin, or sys.
If the group owner of the at.deny file is not set to root, bin, or sys, unauthorized users could be allowed to view or edit sensitive information contained within the file. Unauthorized modification could result in Denial of Service to authorized "at" users or provide unauthorized users with the ability to run "at" jobs.System AdministratorECLP-1
SV-39903r1_rule
GEN003770
CCI-000225
MEDIUM
The services file must be group-owned by root, bin, or sys.
Failure to give ownership of system configuration files to root or a system group provides the designated owner and unauthorized users with the potential to change the system configuration which could weaken the system's security posture.System AdministratorECLP-1
SV-26668r1_rule
GEN003825
CCI-000305
MEDIUM
The rshd service must not be installed.
The rshd process provides a typically unencrypted, host-authenticated remote access service. SSH should be used in place of this service.System AdministratorDCPP-1
SV-26670r1_rule
GEN003835
CCI-000305
MEDIUM
The rlogind service must not be installed.
The rlogind process provides a typically unencrypted, host-authenticated remote access service. SSH should be used in place of this service.System AdministratorDCPP-1
SV-26674r1_rule
GEN003845
CCI-000305
MEDIUM
The rexecd service must not be installed.
The rexecd process provides a typically unencrypted, host-authenticated remote access service. SSH should be used in place of this service.System AdministratorECSC-1
SV-39905r1_rule
GEN004930
CCI-000225
MEDIUM
The ftpusers file must be group-owned by root, bin, or sys.
If the ftpusers file is not group-owned by root or a system group, an unauthorized user may modify the file to allow unauthorized accounts to use FTP.System AdministratorECLP-1
SV-26740r1_rule
GEN005390
CCI-000225
MEDIUM
The /etc/syslog.conf file must have mode 0640 or less permissive.
Unauthorized users must not be allowed to access or modify the /etc/syslog.conf file.System AdministratorECLP-1
SV-26749r1_rule
GEN005501
CCI-001436
MEDIUM
The SSH client must be configured to only use the SSHv2 protocol.
SSHv1 is not a DoD-approved protocol and has many well-known vulnerability exploits. Exploits of the SSH client could provide access to the system with the privileges of the user running the client.System AdministratorDCPP-1
SV-26752r2_rule
GEN005506
CCI-000366
MEDIUM
The SSH daemon must be configured to not use Cipher-Block Chaining (CBC) ciphers.
The Cipher-Block Chaining (CBC) mode of encryption as implemented in the SSHv2 protocol is vulnerable to chosen plain text attacks and must not be used.
System AdministratorECSC-1
SV-26755r1_rule
GEN005511
CCI-000366
MEDIUM
The SSH client must be configured to not use CBC-based ciphers.
The Cipher-Block Chaining (CBC) mode of encryption as implemented in the SSHv2 protocol is vulnerable to chosen plain text attacks and must not be used.
System AdministratorECSC-1
SV-26764r1_rule
GEN005522
CCI-000225
MEDIUM
The SSH public host key files must have mode 0644 or less permissive.
If a public host key file is modified by an unauthorized user, the SSH service may be compromised.System AdministratorECLP-1
SV-26765r1_rule
GEN005523
CCI-000225
MEDIUM
The SSH private host key files must have mode 0600 or less permissive.
If an unauthorized user obtains the private SSH host key file, the host could be impersonated.System AdministratorECLP-1
SV-26766r1_rule
GEN005524
CCI-000366
LOW
The SSH daemon must not permit GSSAPI authentication unless needed.
GSSAPI authentication is used to provide additional authentication mechanisms to applications. Allowing GSSAPI authentication through SSH exposes the system’s GSSAPI to remote hosts, increasing the attack surface of the system. GSSAPI authentication must be disabled unless needed.System AdministratorECSC-1
SV-26767r1_rule
GEN005525
CCI-000366
LOW
The SSH client must not permit GSSAPI authentication unless needed.
GSSAPI authentication is used to provide additional authentication mechanisms to applications. Allowing GSSAPI authentication through SSH exposes the system’s GSSAPI to remote hosts, increasing the attack surface of the system. GSSAPI authentication must be disabled unless needed.System AdministratorECSC-1
SV-26787r1_rule
GEN005539
CCI-000366
MEDIUM
The SSH daemon must not allow compression or must only allow compression after successful authentication.
If compression is allowed in an SSH connection prior to authentication, vulnerabilities in the compression software could result in compromise of the system from an unauthenticated connection, potentially with root privileges.System AdministratorECSC-1
SV-26813r1_rule
GEN005750
CCI-000225
MEDIUM
The NFS export configuration file must be group-owned by root, bin, or sys.
Failure to give group ownership of the NFS export configuration file to root or system groups provides the designated group owner and possible unauthorized users with the potential to change system configuration which could weaken the system's security posture.System AdministratorECLP-1
SV-26931r1_rule
GEN007840
CCI-000366
MEDIUM
The DHCP client must be disabled if not needed.
DHCP allows for the unauthenticated configuration of network parameters on the system by exchanging information with a DHCP server.System AdministratorECSC-1
SV-40726r1_rule
GEN008060
CCI-000225
MEDIUM
If the system is using LDAP for authentication or account information the LDAP client configuration file must have mode 0600 or less permissive.
LDAP can be used to provide user authentication and account information, which are vital to system security. The LDAP client configuration must be protected from unauthorized modification.System AdministratorECLP-1
SV-40727r1_rule
GEN008080
CCI-000225
MEDIUM
If the system is using LDAP for authentication or account information, the LDAP configuration file must be owned by root.
LDAP can be used to provide user authentication and account information, which are vital to system security. The LDAP client configuration must be protected from unauthorized modification.System AdministratorECLP-1
SV-39906r1_rule
GEN008100
CCI-000225
MEDIUM
If the system is using LDAP for authentication or account information, the LDAP configuration file must be group-owned by root, bin, or sys.
LDAP can be used to provide user authentication and account information, which are vital to system security. The LDAP client configuration must be protected from unauthorized modification.System AdministratorECLP-1
SV-26968r1_rule
GEN008460
CCI-000366
LOW
The system must have USB disabled unless needed.
USB is a common computer peripheral interface. USB devices may include storage devices that could be used to install malicious software on a system or exfiltrate data.
trueSystem AdministratorECSC-1
SV-26991r1_rule
GEN008800
CCI-000351
LOW
The system package management tool must cryptographically verify the authenticity of software packages during installation.
To prevent the installation of software from unauthorized sources, the system package management tool must use cryptographic algorithms to verify the packages are authentic.System AdministratorECSC-1
SV-27013r1_rule
GEN000000-SOL00250
CCI-000225
MEDIUM
The /usr/aset/userlist file must be group-owned by root.
The /usr/aset/userlist file is critical to system security and must be protected from unauthorized access.System AdministratorECLP-1
SV-27277r1_rule
GEN002690
CCI-000162
MEDIUM
System audit logs must be group-owned by root, bin, or sys.
Sensitive system and user information could provide a malicious user with enough information to penetrate further into the system.System AdministratorECLP-1, ECTP-1
SV-28632r1_rule
GEN003624
CCI-001208
LOW
The system must use a separate filesystem for /tmp (or equivalent).
The use of separate filesystems for different paths can protect the system from failures resulting from a filesystem becoming full or failing.System AdministratorECSC-1
Overview
RMF Control
Vuln Id
Rule Id
Version
CCI
Severity
Description
Details
Check Text ()
Fix Text ()
Feedback
Thank you so much for spending time on this site. We are always seeking feedback for suggestions or feature requests. Please let us know if there is anything you'd like to see added to the site.