UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must not have the rstatd service active.


Overview

Finding ID Version Rule ID IA Controls Severity
V-29517 GEN009330 SV-38721r1_rule ECSC-1 Medium
Description
The rstatd can give out information on the running system, such as the CPU usage, the system uptime, its network usage, and other system information that could potentially aid in an attack. The rstatd service is unnecessary and it weakens the defensive posture of the system. If systems monitoring is needed, use a third party tool or SNMP.
STIG Date
AIX 5.3 SECURITY TECHNICAL IMPLEMENTATION GUIDE 2014-10-03

Details

Check Text ( C-37817r1_chk )
Check the /etc/inetd.conf file for active rstatd service.

#grep rstatd /etc/inetd.conf | grep -v \#

If the rstatd service is enabled, this is a finding.
Fix Text (F-33075r1_fix)
Edit the /etc/inetd.conf file and comment out the rstatd service line.

Restart the inetd service.

# refresh -s inetd