STIGQter STIGQter: STIG Summary: Solaris 10 X86 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

The smb.conf file must use the hosts option to restrict access to Samba.

DISA Rule

SV-227933r603266_rule

Vulnerability Number

V-227933

Group Title

SRG-OS-000480

Rule Version

GEN006220

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit the smb.conf file and set the hosts option to permit only authorized hosts to access Samba.

Check Contents

Examine the smb.conf file. Default locations for this file include /etc, /etc/sfw, /etc/samba, and /etc/sfw/samba. If the system has Samba installed in non-standard locations, also check the smb.conf in those locations.

Procedure:
# more /etc/smb.conf /etc/sfw/smb.conf /etc/samba/smb.conf /etc/sfw/samba/smb.conf

If the hosts option is not present to restrict access to a list of authorized hosts and networks, this is a finding.

Vulnerability Number

V-227933

Documentable

False

Rule Version

GEN006220

Severity Override Guidance

Examine the smb.conf file. Default locations for this file include /etc, /etc/sfw, /etc/samba, and /etc/sfw/samba. If the system has Samba installed in non-standard locations, also check the smb.conf in those locations.

Procedure:
# more /etc/smb.conf /etc/sfw/smb.conf /etc/samba/smb.conf /etc/sfw/samba/smb.conf

If the hosts option is not present to restrict access to a list of authorized hosts and networks, this is a finding.

Check Content Reference

M

Target Key

4061

Comments