OL6-00-000078 - The system must implement virtual address space randomization.

Information

Address space layout randomization (ASLR) makes it more difficult for an attacker to predict the location of attack code he or she has introduced into a process's address space during an attempt at exploitation. Additionally, ASLR also makes it more difficult for an attacker to know the location of existing code in order to repurpose it using return oriented programming (ROP) techniques.

Solution

To set the runtime status of the 'kernel.randomize_va_space' kernel parameter, run the following command:

# sysctl -w kernel.randomize_va_space=2

If this is not the system's default value, add the following line to '/etc/sysctl.conf':

kernel.randomize_va_space = 2

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Linux_6_V2R7_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-208848r793633_rule, STIG-ID|OL6-00-000078, STIG-Legacy|SV-65163, STIG-Legacy|V-50957, Vuln-ID|V-208848

Plugin: Unix

Control ID: 74a88ab20ebf196f370dbb28baa45c24accf1afc6bbd00cca9fd6c5aab2ced98