UCF STIG Viewer Logo

The ldd command must be disabled unless it protects against the execution of untrusted files.


Overview

Finding ID Version Rule ID IA Controls Severity
GEN007960-ESXI5-PNF GEN007960-ESXI5-PNF GEN007960-ESXI5-PNF_rule Medium
Description
The ldd command provides a list of dependent libraries needed by a given binary, which is useful for troubleshooting software. Instead of parsing the binary file, some ldd implementations invoke the program with a special environment variable set, which causes the system dynamic linker to display the list of libraries. Specially crafted binaries can specify an alternate dynamic linker which may cause a program to be executed instead of examined. If the program is from an untrusted source, such as in a user home directory, or a file suspected of involvement in a system compromise, unauthorized software may be executed with the rights of the user running ldd. Applicable, but permanent not-a-finding - No ldd command.
STIG Date
VMware ESXi v5 Security Technical Implementation Guide 2013-01-15

Details

Check Text ( C-GEN007960-ESXI5-PNF_chk )
ESXi supports this requirement and cannot be configured to be out of compliance. This is a permanent not a finding.
Fix Text (F-GEN007960-ESXI5-PNF_fix)
This requirement is permanent not a finding. No fix is required.