UCF STIG Viewer Logo

The underlying operating system of the DNS server is not in compliance with the appropriate OS STIG.


Overview

Finding ID Version Rule ID IA Controls Severity
V-13313 DNS0170 SV-13885r1_rule ECSC-1 Medium
Description
A vulnerability in the underlying operating system of a DNS server could potentially impact not only the DNS server but the entire network infrastructure to include the Global Information Grid (GIG).
STIG Date
DNS Policy 2013-07-08

Details

Check Text ( C-9849r1_chk )
Review the Operating System against the appropriate OS STIG. For a Windows system this would mean an evaluation with the Gold Disk; for a UNIX/LINUX system this would mean an evaluation using the SRR scripts. STIG compliance means that all findings are either closed, or there is a POA&M to address any outstanding vulnerabilities.
Fix Text (F-11160r1_fix)
The underlying Operating System of the DNS server must be in compliance with the appropriate OS STIG.