STIGQter STIGQter: STIG Summary: Solaris 10 X86 Security Technical Implementation Guide Version: 1 Release: 26 Benchmark Date: 24 Jan 2020: All network services daemon files must have mode 0755 or less permissive.

DISA Rule

SV-27161r1_rule

Vulnerability Number

V-786

Group Title

GEN001180

Rule Version

GEN001180

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Change the mode of the network services daemon.
# chmod 0755 <path>

Check Contents

Check the mode of network services daemons.
# ls -la /usr/bin /usr/sbin
If the mode of a network services daemon is more permissive than 0755, this is a finding.
NOTE: Network daemons not residing in these directories (such as httpd or sshd) must also be checked for the correct permissions.

A way to locate network daemons, such as httpd and sshd, is with the ps command.
# ps -ef | egrep '(sshd|httpd)'

Vulnerability Number

V-786

Documentable

False

Rule Version

GEN001180

Severity Override Guidance

Check the mode of network services daemons.
# ls -la /usr/bin /usr/sbin
If the mode of a network services daemon is more permissive than 0755, this is a finding.
NOTE: Network daemons not residing in these directories (such as httpd or sshd) must also be checked for the correct permissions.

A way to locate network daemons, such as httpd and sshd, is with the ps command.
# ps -ef | egrep '(sshd|httpd)'

Check Content Reference

M

Responsibility

System Administrator

Target Key

25

Comments