UCF STIG Viewer Logo

Management Information Base (MIB) files must not have extended ACLs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-227880 GEN005350 SV-227880r603266_rule Medium
Description
The ability to read the MIB file could impart special knowledge to an intruder or malicious user about the ability to extract compromising information about the system or network.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2020-12-04

Details

Check Text ( C-30042r490036_chk )
Check the modes for all Management Information Base (MIB) files on the system.

# find /etc/sma/snmp/ /etc/snmp/conf/ /var/sma_snmp/ /usr/sfw/lib/sma_snmp/ -type f | grep -i mib | egrep -v '\.conf$' | xargs ls -lL

If the permissions include a "+", the file has an extended ACL, this is a finding.
Fix Text (F-30030r490037_fix)
Remove the extended ACL from the file.
# chmod A- [mib file]