UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The dialog to enable users to grant permissions to execute signed content from an un-trusted authority must be disabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32828 JRE0001-UX SV-43596r2_rule DCBP-1 Medium
Description
Java applets exist both signed and unsigned. Even for signed applets, there can be many sources, some of which may be purveyors of malware. Applet sources considered trusted can have their information populated into the browser, enabling Java to validate applets against trusted sources. Permitting execution of signed Java applets from un-trusted sources may result in acquiring malware, and risks system modification, invasion of privacy, or denial of service. NOTE: The 'JRE' directory in the file path may reflect the specific JRE release installed.
STIG Date
Java Runtime Environment (JRE) version 6 STIG for Unix 2013-07-25

Details

Check Text ( C-41457r6_chk )
If the system is on the SIPRNET, this requirement is NA.

Examine the system 'deployment.properties' file for Java which is located by default at
/usr/java/jre/lib/deployment.properties.

If the 'deployment.security.askgrantdialog.notinca=false' key is not present, this is a finding.

If the key 'deployment.security.askgrantdialog.notinca' exists and is set to true, this is a finding.
Fix Text (F-37097r6_fix)
Disable the 'Allow user to grant permissions to content from an un-trusted authority' feature.

Navigate to the 'deployment.properties' file for Java, the default location is
/usr/java/jre/lib/deployment.properties

If the key does not exist, create the 'deployment.security.askgrantdialog.notinca' key and set the value to 'false'.

If the key does exist. update the 'deployment.security.askgrantdialog.notinca' key to be a value of 'false'.