STIGQter STIGQter: STIG Summary: IBM AIX 7.x Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

If Stream Control Transmission Protocol (SCTP) must be disabled on AIX.

DISA Rule

SV-215393r508663_rule

Vulnerability Number

V-215393

Group Title

SRG-OS-000096-GPOS-00050

Rule Version

AIX7-00-003088

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If SCTP is installed, unload it from the kernel and uninstall it from the system using the following commands:
# sctpctrl unload
# installp -ug bos.net.sctp

Check Contents

Check the system to determine if SCTP is installed:

# lslpp -L bos.net.sctp
Fileset Level State Type Description (Uninstaller)
----------------------------------------------------------------------------
lslpp: 0504-132 Fileset bos.net.sctp not installed.

If the "bos.net.sctp" fileset is not listed, SCTP is not installed, this is not a finding.

If the "bos.net.sctp" fileset is listed then SCTP is installed, this is a finding.

Vulnerability Number

V-215393

Documentable

False

Rule Version

AIX7-00-003088

Severity Override Guidance

Check the system to determine if SCTP is installed:

# lslpp -L bos.net.sctp
Fileset Level State Type Description (Uninstaller)
----------------------------------------------------------------------------
lslpp: 0504-132 Fileset bos.net.sctp not installed.

If the "bos.net.sctp" fileset is not listed, SCTP is not installed, this is not a finding.

If the "bos.net.sctp" fileset is listed then SCTP is installed, this is a finding.

Check Content Reference

M

Target Key

4012

Comments