GEN008420 - The system must use available memory address randomization techniques.

Information

Successful exploitation of buffer overflow vulnerabilities relies in some measure to having a predictable address structure of the executing program. Address randomization techniques reduce the probability of a successful exploit.

Solution

Configure the system to use any available memory address randomization techniques. Recommended settings are either to enable stack execution disablement for all suid files or select system executables.
Set sedmgr to enforce on selected files and terminate processes violating stack execution boundaries.
# sedmgr -m select -o off
OR
Set sedmgr to enforce on setid files and terminate processes violating stack execution boundaries.
# sedmgr -m setidfiles -o off
After a global system change to the sed, the system should be rebooted.
# shutdown -Fr

See Also

http://iasecontent.disa.mil/stigs/zip/U_STIG_Library_2015_07.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-38831r1_rule, STIG-ID|GEN008420, Vuln-ID|V-22576

Plugin: Unix

Control ID: e6759ba31b2fa306283848cc7a2fffa4a259eb2be33861f020119faa83db76a2