[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-95699-5

Platform: cpe:/o:debian:debian_linux:11.x, cpe:/o:ubuntu:ubuntu_linux:16.04, cpe:/o:ubuntu:ubuntu_linux:18.04, cpe:/o:ubuntu:ubuntu_linux:20.04, cpe:/o:ubuntu:ubuntu_linux:22.04, cpe:/o:ubuntu:ubuntu_linux:23.04Date: (C)2021-06-15   (M)2023-09-01



Recent processors in the x86 family support the ability to prevent code execution on a per memory page basis. Generically and on AMD processors, this ability is called No Execute (NX), while on Intel processors it is called Execute Disable (XD). This ability can help prevent exploitation of buffer overflow vulnerabilities and should be activated whenever possible. Extra steps must be taken to ensure that this protection is enabled, particularly on 32-bit x86 systems. Other processors, such as Itanium and POWER, have included such support since inception and the standard kernel for those platforms supports the feature. Rationale: Enabling any feature that can protect against buffer overflow attacks enhances the security of the system. Fix: On 32 bit systems install a kernel with PAE support, no installation is required on 64 bit systems. If necessary configure your bootloader to load the new kernel and reboot the system. You may need to enable NX or XD support in your bios. Notes: Ensure your system supports the XD or NX bit and has PAE support before implementing this recommendation as this may prevent it from booting if these are not supported by your hardware.


Parameter:

[yes/no]


Technical Mechanism:

On 32 bit systems install a kernel with PAE support, no installation is required on 64 bit systems

CCSS Severity:CCSS Metrics:
CCSS Score : 6.8Attack Vector: LOCAL
Exploit Score: 2.5Attack Complexity: LOW
Impact Score: 4.2Privileges Required: NONE
Severity: MEDIUMUser Interaction: NONE
Vector: AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:HScope: UNCHANGED
 Confidentiality: LOW
 Integrity: NONE
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:85276
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:70834
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:69553
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:87275
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:70730
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:92288


OVAL    6
oval:org.secpod.oval:def:70730
oval:org.secpod.oval:def:69553
oval:org.secpod.oval:def:85276
oval:org.secpod.oval:def:87275
...
XCCDF    8
xccdf_org.secpod_benchmark_general_Ubuntu_16_04
xccdf_org.secpod_benchmark_general_Ubuntu_18_04
xccdf_org.secpod_benchmark_NIST_800_53_r5_Debain_11
xccdf_org.secpod_benchmark_NIST_800_53_r5_Debian_11
...

© SecPod Technologies