GEN005200 - X displays must not be exported to the world.

Information

Open X displays allow an attacker to capture keystrokes and to execute commands remotely. Many users have their X Server set to 'xhost +', permitting access to the X Server by anyone, from anywhere.

Solution

If using an xhost-type authentication the 'xhost -' command can be used to remove current trusted hosts and then selectively allow only trusted hosts to connect with 'xhost +' commands. A cryptographically secure authentication, such as provided by the xauth program, is always preferred.

Refer to your X11 server's documentation for further security information.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_5_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL, CONFIGURATION MANAGEMENT

References: 800-53|AC-6, 800-53|CM-6b., CAT|I, CCI|CCI-000225, CCI|CCI-000366, Rule-ID|SV-218573r603259_rule, STIG-ID|GEN005200, STIG-Legacy|SV-63295, STIG-Legacy|V-4697, Vuln-ID|V-218573

Plugin: Unix

Control ID: 198a238e4fe2e7093a80a51be728e19326f6e7802c9819093b6f0142f5afae23