UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The dialog enabling users to grant permissions to execute signed content from an un-trusted authority must be locked.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32829 JRE0010-J72K7 SV-43639r1_rule Medium
Description
Java applets exist both signed and unsigned. Even for signed applets, there can be many sources, some of which may be purveyors of malware. Applet sources considered trusted can have their information populated into the browser, enabling Java to validate applets against trusted sources. Permitting execution of signed Java applets from un-trusted sources may result in acquiring malware, and risks system modification, invasion of privacy, or denial of service. Ensuring users cannot change settings, contributes to a more consistent security profile.
STIG Date
Java Runtime Environment (JRE) 7 STIG for Win7 2012-07-23

Details

Check Text ( C-41509r2_chk )
Navigate to the 'deployment.properties' file for Java.
C:\Program Files\Java\jre7\lib\deployment.properties

If the key 'deployment.security.askgrantdialog.notinca.locked' is not present, this is a finding.
Fix Text (F-37145r2_fix)
Lock the 'Allow user to grant permissions to content from an un-trusted authority' feature.
Navigate to the 'deployment.properties' file for Java.
C:\Program Files\Java\jre7\lib\deployment.properties

Add the key 'deployment.security.askgrantdialog.notinca.locked'.