RHEL-07-031010 - The Red Hat Enterprise Linux operating system must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Unintentionally running a rsyslog server accepting remote messages puts the system at increased risk. Malicious rsyslog messages sent to the server could exploit vulnerabilities in the server software itself, could introduce misleading information in to the system's logs, or could fill the system's storage leading to a Denial of Service.

If the system is intended to be a log aggregation server its use must be documented with the ISSO.

Solution

Modify the '/etc/rsyslog.conf' file to remove the 'ModLoad imtcp', 'ModLoad imudp', and 'ModLoad imrelp' configuration lines, or document the system as being used for log aggregation.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_7_V3R9_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000318, CCI|CCI-000368, CCI|CCI-001812, CCI|CCI-001813, CCI|CCI-001814, Rule-ID|SV-204575r853986_rule, STIG-ID|RHEL-07-031010, STIG-Legacy|SV-86835, STIG-Legacy|V-72211, Vuln-ID|V-204575

Plugin: Unix

Control ID: 6399987a1b8fdff8bbd3aa1e11e8dbded8d00d4c578fee4863acb14d5cf25bef