UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must not have the systat service active.


Overview

Finding ID Version Rule ID IA Controls Severity
V-29513 GEN009290 SV-38717r1_rule ECSC-1 Medium
Description
The systat daemon allows remote users to see the running process and who is running them. This may aid in information collection for an attack and weaken the security posture of the system.
STIG Date
AIX 5.3 Security Technical Implementation Guide 2012-05-25

Details

Check Text ( C-37813r1_chk )
Check the /etc/inetd.conf file for active systat service.

#grep systat /etc/inetd.conf | grep -v \#

If the systat service is enabled, this is a finding.
Fix Text (F-33071r1_fix)
Edit /etc/inetd.conf and comment out systat the service line.

Restart the inetd service.

# refresh -s inetd