UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The TFTP daemon must operate in secure mode which provides access only to a single directory on the host file system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-847 GEN005080 SV-28419r3_rule ECSC-1 High
Description
Secure mode limits TFTP requests to a specific directory. If TFTP is not running in secure mode, it may be able to write to any file or directory and may seriously impair system integrity, confidentiality, and availability.
STIG Date
Solaris 10 SPARC Security Technical Implementation Guide 2020-02-26

Details

Check Text ( C-28684r3_chk )
Determine if TFTPD is running in secure mode.

# grep tftp /etc/inet/inetd.conf
OR
# svccfg -s tftp/udp6 listprop |grep in.tftpd |grep exec

If any returned service line does not use the -s parameter to TFTPD, this is a finding. If TFTP is not installed this check is not applicable.
Fix Text (F-25710r3_fix)
Edit /etc/inet/inetd.conf and add the -s parameter to TFTPD.
# inetconv

OR

Update the SMF entry for the TFTP daemon.
# svccfg -s tftp/udp6 setprop inetd_start/exec = "astring:\"/usr/sbin/in.tftpd -s \""