[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-94427-2

Platform: cpe:/o:oracle:linux:8, cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:enterprise_linux:9Date: (C)2019-11-07   (M)2023-07-04



To set the runtime status of the 'kernel.randomize_va_space' kernel parameter, run the following command:


Parameter:

[don't_use_ASLR/randomize base address for mmap'd areas/ditto, and also randomize the brk base address]


Technical Mechanism:

Address space layout randomization (ASLR) makes it more difficult for an attacker to predict the location of attack code they have introduced into a process's address space during an attempt at exploitation. Additionally, ASLR makes it more difficult for an attacker to know the location of existing code in order to re-purpose it using return oriented programming (ROP) techniques.

CCSS Severity:CCSS Metrics:
CCSS Score : 6.2Attack Vector: LOCAL
Exploit Score: 2.5Attack Complexity: LOW
Impact Score: 3.6Privileges Required: NONE
Severity: MEDIUMUser Interaction: NONE
Vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: NONE
 Availability: NONE
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:72230
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:84105
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:55819


OVAL    3
oval:org.secpod.oval:def:72230
oval:org.secpod.oval:def:84105
oval:org.secpod.oval:def:55819
XCCDF    3
xccdf_org.secpod_benchmark_general_RHEL_8
xccdf_org.secpod_benchmark_general_OEL_8
xccdf_org.secpod_benchmark_general_RHEL_9

© SecPod Technologies