CCE-91913-4Platform: cpe:/o:ubuntu:ubuntu_linux:16.04 | Date: (C)2018-07-09 (M)2023-07-04 |
Set the system flag to force randomized virtual memory region placement.
Disabled = No ASLR (Memory address would not be randomizaed)
Conservative Randomization == Randomize addresses for Stack, Heap, Shared Libs, PIE, mmap(), VDRO
Full Randomization = Conservative Randomization + memory managed via brk()
Rationale:
Randomly placing virtual memory regions will make it difficult to write memory page exploits as the memory placement will be consistently shifting.
Parameter:
[Disabled/Conservative Randomization/Full Randomization]
Technical Mechanism:
Add the following line to the /etc/sysctl.conf file.
kernel.randomize_va_space = 2
CCSS Severity: | CCSS Metrics: |
CCSS Score : 6.2 | Attack Vector: LOCAL |
Exploit Score: 2.5 | Attack Complexity: LOW |
Impact Score: 3.6 | Privileges Required: NONE |
Severity: MEDIUM | User Interaction: NONE |
Vector: AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: NONE |
| Availability: NONE |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:46174 |