GEN008420 - The system must use available memory address randomization techniques.

Information

Successful exploitation of buffer overflow vulnerabilities relies in some measure to having a predictable address structure of the executing program. Address randomization techniques reduce the probability of a successful exploit.

Solution

Edit (or add if necessary) the entry in /etc/sysctl.conf for the 'kernel.randomize_va_space' kernel parameter. Ensure this parameter is set to '2' as in:

kernel.randomize_va_space = 2

If this was not already the default, reboot the system for the change to take effect.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-218712r603259_rule, STIG-ID|GEN008420, STIG-Legacy|SV-63197, STIG-Legacy|V-22576, Vuln-ID|V-218712

Plugin: Unix

Control ID: b081a44d479ce95d5c2e2bd6183191be221a567d6b5d8e1815ae1fe65b2432e5