STIGQter STIGQter: STIG Summary: Solaris 10 SPARC Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

All network services daemon files must have mode 0755 or less permissive.

DISA Rule

SV-226487r603265_rule

Vulnerability Number

V-226487

Group Title

SRG-OS-000312

Rule Version

GEN001180

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Change the mode of the network services daemon.
# chmod 0755 <path>

Check Contents

Check the mode of network services daemons.
# ls -la /usr/bin /usr/sbin
If the mode of a network services daemon is more permissive than 0755, this is a finding.
NOTE: Network daemons not residing in these directories (such as httpd or sshd) must also be checked for the correct permissions.

A way to locate network daemons, such as httpd and sshd, is with the ps command.
# ps -ef | egrep '(sshd|httpd)'

Vulnerability Number

V-226487

Documentable

False

Rule Version

GEN001180

Severity Override Guidance

Check the mode of network services daemons.
# ls -la /usr/bin /usr/sbin
If the mode of a network services daemon is more permissive than 0755, this is a finding.
NOTE: Network daemons not residing in these directories (such as httpd or sshd) must also be checked for the correct permissions.

A way to locate network daemons, such as httpd and sshd, is with the ps command.
# ps -ef | egrep '(sshd|httpd)'

Check Content Reference

M

Target Key

4060

Comments