GEN005200 - X displays must not be exported to the world.

Information

Open X displays allow an attacker to capture keystrokes and to execute commands remotely. Many users have their X Server set to xhost +, permitting access to the X Server by anyone, from anywhere.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

If using an xhost-type authentication the xhost - command can be used to remove current trusted hosts and then selectively allow only trusted hosts to connect with xhost + commands. A cryptographically secure authentication, such as provided by the xauth program, is always preferred. Refer to your X11 server's documentation for further security information.

See Also

http://iasecontent.disa.mil/stigs/zip/U_STIG_Library_2015_07.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6, CAT|I, CCI|CCI-000225, Rule-ID|SV-4697r2_rule, STIG-ID|GEN005200, Vuln-ID|V-4697

Plugin: Unix

Control ID: 614bbc4c37c5868f2fb011601936d3ee30ed6f3945545cf18118a254a26822b3