Java Runtime Environment (JRE) version 7 STIG for Unix
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- Severity
- M
- CCI
- Version
- JRE0001-UX
- Vuln IDs
-
- V-32828
- Rule IDs
-
- SV-43596r2_rule
Checks: C-41457r6_chk
If the system is on the SIPRNET, this requirement is NA. Examine the system 'deployment.properties' file for Java which is located by default at /usr/java/jre/lib/deployment.properties. If the 'deployment.security.askgrantdialog.notinca=false' key is not present, this is a finding. If the key 'deployment.security.askgrantdialog.notinca' exists and is set to true, this is a finding.
Fix: F-37097r6_fix
Disable the 'Allow user to grant permissions to content from an un-trusted authority' feature. Navigate to the 'deployment.properties' file for Java, the default location is /usr/java/jre/lib/deployment.properties If the key does not exist, create the 'deployment.security.askgrantdialog.notinca' key and set the value to 'false'. If the key does exist. update the 'deployment.security.askgrantdialog.notinca' key to be a value of 'false'.
- RMF Control
- Severity
- M
- CCI
- Version
- JRE0010-UX
- Vuln IDs
-
- V-32829
- Rule IDs
-
- SV-43601r1_rule
Checks: C-41463r5_chk
Navigate to the 'deployment.properties' file for Java, the default location is /usr/java/jre/lib/deployment.properties Review the file. If the 'deployment.security.askgrantdialog.notinca.locked' key is not present this is a finding.
Fix: F-37103r6_fix
Lock the 'Allow user to grant permissions to content from an un-trusted authority' feature. Navigate to the 'deployment.properties' file for Java, the default location is /usr/java/jre/lib/deployment.properties Edit the file and add the 'deployment.security.askgrantdialog.notinca.locked' key.
- RMF Control
- Severity
- M
- CCI
- Version
- JRE0020-UX
- Vuln IDs
-
- V-32830
- Rule IDs
-
- SV-43604r2_rule
Checks: C-41467r8_chk
If the system is on the SIPRNET, this requirement is NA. Navigate to the 'deployment.properties' file for Java, the default location is /usr/java/jre/lib/deployment.properties. If the 'deployment.security.validation.crl' key is not present, this is a finding. If the 'deployment.security.validation.crl' key is present and set to 'false', this is a finding.
Fix: F-37107r5_fix
Enable the 'Check certificates for revocation using Certificate Revocation Lists (CRL)' option. Navigate to the 'deployment.properties' file for Java, the default location is /usr/java/jre/lib/deployment.properties Add or update the 'deployment.security.validation.crl' key. Set the value to 'true'.
- RMF Control
- Severity
- M
- CCI
- Version
- JRE0030-UX
- Vuln IDs
-
- V-32831
- Rule IDs
-
- SV-43617r3_rule
Checks: C-41480r13_chk
If the system is on the SIPRNET, this requirement is NA. Navigate to the system 'deployment.properties' file for Java, the default location is /usr/java/jre/lib/deployment.properties. If the 'deployment.security.validation.crl.locked' key is not present within the deployment.properties file, this is a finding. If the 'deployment.security.validation.ocsp.locked' key is not present within the deployment.properties file, this is a finding.
Fix: F-37120r12_fix
Navigate to the system 'deployment.properties' file for Java, the default location is /usr/java/jre/lib/deployment.properties. Add the 'deployment.security.validation.crl.locked' key to the deployment.properties file. Add the 'deployment.security.validation.ocsp.locked' key to the deployment.properties file.
- RMF Control
- Severity
- M
- CCI
- Version
- JRE0040-UX
- Vuln IDs
-
- V-32832
- Rule IDs
-
- SV-43618r2_rule
Checks: C-41481r8_chk
If the system is on the SIPRNET, this requirement is NA. Navigate to the 'deployment.properties' file for Java. /usr/java/jre/lib/deployment.properties Examine the deployment.properties file for the 'deployment.security.validation.ocsp' key. If the 'deployment.security.validation.ocsp' key is not present, this is a finding. If the key 'deployment.security.validation.ocsp' is set to 'false', this is a finding.
Fix: F-37121r6_fix
If the system is on the SIPRNET, this requirement is NA. Enable the 'Enable online certificate validation' option. Navigate to the 'deployment.properties' file for Java. /usr/java/jre/lib/deployment.properties Add or update the key 'deployment.security.validation.ocsp' to be 'true'.
- RMF Control
- Severity
- M
- CCI
- Version
- JRE0050-UX
- Vuln IDs
-
- V-32833
- Rule IDs
-
- SV-43619r2_rule
Checks: C-41482r6_chk
If the system is on the SIPRNET, this requirement is NA. Navigate to the 'deployment.properties' file for Java. /usr/java/jre/lib/deployment.properties If the key 'deployment.security.validation.ocsp.locked' is not present, this is a finding.
Fix: F-37122r6_fix
If the system is on the SIPRNET, this requirement is NA. Lock the 'Enable online certificate validation' option. Navigate to the 'deployment.properties' file for Java. /usr/java/jre/lib/deployment.properties Add the key 'deployment.security.validation.ocsp.locked'.
- RMF Control
- Severity
- M
- CCI
- Version
- JRE0060-UX
- Vuln IDs
-
- V-32842
- Rule IDs
-
- SV-43649r1_rule
Checks: C-41526r4_chk
Navigate to the deployment.config file. /usr/java/jre/lib/deployment.config If the configuration file does not contain 'deployment.system.config=file:/usr/java/jre/lib/deployment.properties', this is a finding. If the configuration file does not contain 'deployment.system.config.mandatory=false', this is a finding.
Fix: F-37162r6_fix
Specify the path to the deployment.properties file and set the mandatory configuration values. Navigate to the deployment.config file. /usr/java/jre/lib/deployment.properties Include the following keys in the configuration file: 'deployment.system.config=file:/usr/java/jre/lib/deployment.properties' 'deployment.system.config.mandatory=false'.
- RMF Control
- Severity
- M
- CCI
- Version
- JRE0070-UX
- Vuln IDs
-
- V-32901
- Rule IDs
-
- SV-43621r1_rule
Checks: C-41484r5_chk
Navigate to the lib directory: /usr/java/jre/lib/ If there is no configuration file entitled 'deployment.config', this is a finding.
Fix: F-37124r6_fix
Create a JRE deployment configuration file. Navigate to the lib directory: /usr/java/jre/lib/ Create a configuration file entitled 'deployment.config'.
- RMF Control
- Severity
- M
- CCI
- Version
- JRE0080-UX
- Vuln IDs
-
- V-32902
- Rule IDs
-
- SV-43620r2_rule
Checks: C-41483r6_chk
Navigate to the lib directory: /usr/java/jre/lib/ If there is no properties file entitled 'deployment.properties', this is a finding.
Fix: F-37123r6_fix
Create the Java deployment properties file. Navigate to the lib directory: /usr/java/jre/lib/ Create a properties file entitled 'deployment.properties'.
- RMF Control
- Severity
- M
- CCI
- Version
- JRE0090-UX
- Vuln IDs
-
- V-39239
- Rule IDs
-
- SV-51133r1_rule
Checks: C-46509r5_chk
Open a terminal window and type the command; "java -version" sans quotes. The return value should contain Java build information; "Java (TM) SE Runtime Environment (build x.x.x.x)" Cross reference the build information on the system with the Oracle Java site to identify the most recent build available. http://www.oracle.com/technetwork/java/javase/downloads/index.html
Fix: F-44218r5_fix
Test applications to ensure operational compatability with new version of Java. Install latest version of Java JRE.