[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

'rexec' daemon should be enabled or disabled as appropriate

Deprecated
ID: oval:org.secpod.oval:def:25001Date: (C)2015-06-12   (M)2021-06-02
Class: COMPLIANCEFamily: macos




The rexec service must be disabled. The rexec service does not implement crypto and has had several security vulnerabilities in the past. It is disabled by default; enabling it would increase the attack surface of the system. Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DoD non-public information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection (e.g., RDP) thereby providing a degree of confidentiality. The encryption strength of mechanism is selected based on the security categorization of the information. Enable or disable the rexec daemon as appropriate. Use 'launchctl unload -w' to unload the exec.plist file in the LaunchDaemons directory.

Platform:
Apple Mac OS X 10.10
Reference:
CCE-90224-7
CPE    1
cpe:/o:apple:mac_os_x:10.10
CCE    1
CCE-90224-7

© SecPod Technologies