UCF STIG Viewer Logo

The operating system must employ automated mechanisms to enforce strict adherence to protocol format.


Overview

Finding ID Version Rule ID IA Controls Severity
V-28902 SRG-OS-000155 SV-36893r1_rule Medium
Description
Crafted packets not conforming to IEEE standards can be used by malicious people to exploit a host’s protocol stack to create a Denial of Service or force a device reset.
STIG Date
Operating System Security Requirements Guide 2013-03-28

Details

Check Text ( None )
None
Fix Text (None)
None