UCF STIG Viewer Logo

Vendor-recommended software patches and updates, and system security patches and updates, must be installed and up-to-date.


Overview

Finding ID Version Rule ID IA Controls Severity
V-783 GEN000120 SV-27060r1_rule VIVM-1 Medium
Description
Timely patching is critical for maintaining the operational availability, confidentiality, and integrity of Information Technology (IT) systems. However, failure to keep operating system and application software patched is a common mistake made by IT professionals. New patches are released daily, and it is often difficult for even experienced system administrators to keep abreast of all the new patches. When new weaknesses in an operating system exist, patches are usually made available by the vendor to resolve the problems. If the most recent recommended updates and security patches are not installed, unauthorized users may take advantage of weaknesses present in the unpatched software. The lack of prompt attention to patching could result in a system compromise.
STIG Date
Draft AIX Security Technical Implementation Guide 2011-08-17

Details

Check Text ( C-36595r1_chk )
Obtain the list of available patches from IBM.
Verify the available patches and service packs have been installed on the system.
Check the currently running TL (Technology Levels and Service Packs)
#oslevel -s

Perform the following to obtain a list of installed patches:
# /usr/sbin/instfix -i

If there are patches available and applicable for the system that have not been installed, this is a finding.
Fix Text (F-31604r1_fix)
Use a web browser to access the vendor's support website. Download the service packs and patches. Use SMIT to apply the updates.

#smitty update_all