UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The TFTP Server program is controlled improperly.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3241 IFTP0090 SV-6925r2_rule Medium
Description
The Trivial File Transfer Protocol (TFTP) Server, known as tftpd, supports file transfer according to the industry standard Trivial File Transfer Protocol. The TFTP Server does not perform any user identification or authentication, allowing any client to connect to the TFTP Server. Due to this lack of security, the TFTP Server will not be used. Failure to restrict the use of the TFTP Server may result in unauthorized access to the host. This exposure may impact the integrity, availability, and privacy of application data.
STIG Date
z/OS TSS STIG 2018-12-20

Details

Check Text ( C-2767r1_chk )
a) Refer to the following report produced by the TSS Data Collection and Data Set and Resource Data Collection:

- TSSCMDS.RPT(WHOOPGM)
- SENSITVE.RPT(WHOHPGM)

Automated Analysis
Refer to the following report produced by the Data Set and Resource Data Collection:

- PDI(IFTP0090)

b) Ensure the following program controls are in effect for the TFTP Server:

1) Program resources TFTPD and EZATD are owned appropriately in the PROGRAM resource class.
2) No access to the program resources TFTPD and EZATD is permitted.

c) If all items in (b) are true, there is NO FINDING.

d) If any item in (b) is untrue, this is a FINDING.
Fix Text (F-18482r1_fix)
Evaluate the impact of implementing the following change. Develop a plan of action and implement the change as required. Ensure that the EZATD program and its alias TFTPD are defined to CA-TSS and no access to the program resources TFTPD and EZATD is permitted. The following commands provide a sample of how to protect the TFTP server program by assigning ownership and no permissions: TSS ADD(ADMIN) PROGRAM(TFTPD,EZATD)