The VMM must implement address space layout randomization to protect its memory from unauthorized code execution.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-207504 | SRG-OS-000433-VMM-001750 | SV-207504r958928_rule | CCI-002824 | medium |
| Description | ||||
| Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations that are prohibited. Data execution prevention safeguards can either be hardware-enforced or software-enforced with hardware providing the greater strength of mechanism. Examples of attacks are buffer overflow attacks. | ||||
| STIG | Date | |||
| Virtual Machine Manager Security Requirements Guide | 2024-12-06 | |||
Details
Check Text (C-207504r958928_chk)
Verify the VMM implements address space layout randomization to protect its memory from unauthorized code execution.
If it does not, this is a finding.
Fix Text (F-7761r365917_fix)
Configure the VMM to implement address space layout randomization to protect its memory from unauthorized code execution.