UCF STIG Viewer Logo

X Window System connections not required must be disabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-12018 GEN005260 SV-37686r1_rule ECSC-1 Medium
Description
If unauthorized clients are permitted access to the X server, a user's X session may be compromised.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2015-06-12

Details

Check Text ( C-36878r1_chk )
Determine if the X window system is running.

Procedure:
# ps -ef |grep Xorg

Ask the SA if the X window system is an operational requirement. If it is not, this is a finding.

Fix Text (F-31878r1_fix)
Disable the X Windows server on the system.