Free DISA STIG and SRG Library | Vaulted

Java Runtime Environment (JRE) version 7 STIG for Unix

Version 1 Release 6
2016-01-22
U_JRE7_UNIX_V1R6_Manual-xccdf.xml
The Java Runtime Environment (JRE) is a bundle developed and offered by Oracle Corporation which includes the Java Virtual Machine (JVM), class libraries, and other components necessary to run Java applications and applets. Certain default settings within the JRE pose a security risk so it is necessary to deploy system wide properties to ensure a higher degree of security when utilizing the JRE.

Vulnerabilities (11)

The dialog to enable users to grant permissions to execute signed content from an un-trusted authority must be disabled.

Finding ID
JRE0001-UX
Rule ID
SV-43596r2_rule
Severity
Cat II
CCE
(None)
Group Title
JRE0001 Disable ability to grant permission to untrusted authority
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Java applets exist both signed and unsigned. Even for signed applets, there can be many sources, some of which may be purveyors of malware. Applet sources considered trusted can have their information populated into the browser, enabling Java to validate applets against trusted sources. Permitting execution of signed Java applets from un-trusted sources may result in acquiring malware, and risks system modification, invasion of privacy, or denial of service. NOTE: The 'JRE' directory in the file path may reflect the specific JRE release installed.

Fix Text

Disable the 'Allow user to grant permissions to content from an un-trusted authority' feature. Navigate to the 'deployment.properties' file for Java, the default location is /usr/java/jre/lib/deployment.properties If the key does not exist, create the 'deployment.security.askgrantdialog.notinca' key and set the value to 'false'. If the key does exist. update the 'deployment.security.askgrantdialog.notinca' key to be a value of 'false'.

Check Content

If the system is on the SIPRNET, this requirement is NA. Examine the system 'deployment.properties' file for Java which is located by default at /usr/java/jre/lib/deployment.properties. If the 'deployment.security.askgrantdialog.notinca=false' key is not present, this is a finding. If the key 'deployment.security.askgrantdialog.notinca' exists and is set to true, this is a finding.

IA Controls

DCBP-1

The dialog enabling users to grant permissions to execute signed content from an un-trusted authority must be locked.

Finding ID
JRE0010-UX
Rule ID
SV-43601r2_rule
Severity
Cat II
CCE
(None)
Group Title
JRE0010 Lock out option to grant permission to untrusted
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Java applets exist both signed and unsigned. Even for signed applets, there can be many sources, some of which may be purveyors of malware. Applet sources considered trusted can have their information populated into the browser, enabling Java to validate applets against trusted sources. Permitting execution of signed Java applets from un-trusted sources may result in malware running on the system, and risks system modification, invasion of privacy, or denial of service. Ensuring users cannot change the permission settings which control the execution of signed Java applets contributes to a more consistent security profile. NOTE: The 'JRE' directory in the file path may reflect the specific JRE release installed.

Fix Text

Lock the 'Allow user to grant permissions to content from an un-trusted authority' feature. Navigate to the 'deployment.properties' file for Java, the default location is /usr/java/jre/lib/deployment.properties Edit the file and add the 'deployment.security.askgrantdialog.notinca.locked' key.

Check Content

If the system is on the SIPRNET this requirement is NA. Navigate to the 'deployment.properties' file for Java, the default location is /usr/java/jre/lib/deployment.properties Review the file. If the 'deployment.security.askgrantdialog.notinca.locked' key is not present this is a finding.

IA Controls

DCBP-1

The setting for users to check publisher certificates for revocation must be enabled.

Finding ID
JRE0020-UX
Rule ID
SV-43604r2_rule
Severity
Cat II
CCE
(None)
Group Title
JRE0020 Enable revocation check on publisher certificates
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

A certificate revocation list is a directory which contains a list of certificates that have been revoked for various reasons. Certificates may be revoked due to improper issuance, compromise of the certificate, and failure to adhere to policy. Therefore, any certificate found on a CRL should not be trusted. Permitting execution of an applet published with a revoked certificate may result in spoofing, malware, system modification, invasion of privacy, and denial of service. NOTE: The 'JRE' directory in the file path may reflect the specific JRE release installed.

Fix Text

Enable the 'Check certificates for revocation using Certificate Revocation Lists (CRL)' option. Navigate to the 'deployment.properties' file for Java, the default location is /usr/java/jre/lib/deployment.properties Add or update the 'deployment.security.validation.crl' key. Set the value to 'true'.

Check Content

If the system is on the SIPRNET, this requirement is NA. Navigate to the 'deployment.properties' file for Java, the default location is /usr/java/jre/lib/deployment.properties. If the 'deployment.security.validation.crl' key is not present, this is a finding. If the 'deployment.security.validation.crl' key is present and set to 'false', this is a finding.

IA Controls

DCBP-1

The setting enabling users to configure the check publisher certificates for revocation must be locked.

Finding ID
JRE0030-UX
Rule ID
SV-43617r3_rule
Severity
Cat II
CCE
(None)
Group Title
JRE0030 Lock the option to check certificates for revocation
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Certificates may be revoked due to improper issuance, compromise of the certificate, and failure to adhere to policy. Therefore, any certificate found revoked on a CRL or via Online Certificate Status Protocol (OCSP) should not be trusted. Permitting execution of an applet published with a revoked certificate may result in spoofing, malware, system modification, invasion of privacy, and denial of service. Ensuring users cannot change these settings assures a more consistent security profile. NOTE: The 'JRE' directory in the file path may reflect the specific JRE release installed.

Fix Text

Navigate to the system 'deployment.properties' file for Java, the default location is /usr/java/jre/lib/deployment.properties. Add the 'deployment.security.validation.crl.locked' key to the deployment.properties file. Add the 'deployment.security.validation.ocsp.locked' key to the deployment.properties file.

Check Content

If the system is on the SIPRNET, this requirement is NA. Navigate to the system 'deployment.properties' file for Java, the default location is /usr/java/jre/lib/deployment.properties. If the 'deployment.security.validation.crl.locked' key is not present within the deployment.properties file, this is a finding. If the 'deployment.security.validation.ocsp.locked' key is not present within the deployment.properties file, this is a finding.

IA Controls

DCBP-1

The option to enable online certificate validation must be enabled.

Finding ID
JRE0040-UX
Rule ID
SV-43618r2_rule
Severity
Cat II
CCE
(None)
Group Title
JRE0040 Enable online certificate validation
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Online certificate validation provides a real-time option to validate a certificate. When enabled, if a certificate is presented, the status of the certificate is requested. The status is sent back as 'current', 'expired', or 'unknown'. Online certificate validation provides a greater degree of validation of certificates when running a signed Java applet. Permitting execution of an applet with an invalid certificate may result in malware execution , system modification, invasion of privacy, and denial of service. NOTE: The 'JRE' directory in the file path may reflect the specific JRE release installed.

Fix Text

If the system is on the SIPRNET, this requirement is NA. Enable the 'Enable online certificate validation' option. Navigate to the 'deployment.properties' file for Java. /usr/java/jre/lib/deployment.properties Add or update the key 'deployment.security.validation.ocsp' to be 'true'.

Check Content

If the system is on the SIPRNET, this requirement is NA. Navigate to the 'deployment.properties' file for Java. /usr/java/jre/lib/deployment.properties Examine the deployment.properties file for the 'deployment.security.validation.ocsp' key. If the 'deployment.security.validation.ocsp' key is not present, this is a finding. If the key 'deployment.security.validation.ocsp' is set to 'false', this is a finding.

IA Controls

DCBP-1

The option to enable online certificate validation must be locked.

Finding ID
JRE0050-UX
Rule ID
SV-43619r2_rule
Severity
Cat II
CCE
(None)
Group Title
JRE0050 Lock online certificate validation
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

Online certificate validation provides a real-time option to validate a certificate. When enabled, if a certificate is presented, the status of the certificate is requested. The status is sent back as 'current', 'expired', or 'unknown'. Online certificate validation provides a greater degree of validation of certificates when running a signed Java applet. Permitting execution of an applet with an invalid certificate may result in malware, system modification, invasion of privacy, and denial of service. Ensuring users cannot change settings contributes to a more consistent security profile. NOTE: The 'JRE' directory in the file path may reflect the specific JRE release installed.

Fix Text

If the system is on the SIPRNET, this requirement is NA. Lock the 'Enable online certificate validation' option. Navigate to the 'deployment.properties' file for Java. /usr/java/jre/lib/deployment.properties Add the key 'deployment.security.validation.ocsp.locked'.

Check Content

If the system is on the SIPRNET, this requirement is NA. Navigate to the 'deployment.properties' file for Java. /usr/java/jre/lib/deployment.properties If the key 'deployment.security.validation.ocsp.locked' is not present, this is a finding.

IA Controls

DCBP-1

The configuration file must contain proper keys and values to deploy settings correctly.

Finding ID
JRE0060-UX
Rule ID
SV-43649r1_rule
Severity
Cat II
CCE
(None)
Group Title
JRE0060 The deployment.config file must be properly configured
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

This configuration file must hold values of the location of the deployment.properties file as well as the enforcement of these properties. Without a proper path for the properties file, deployment would not be possible. If the path specified does not lead to a properties file the value of the 'deployment.system.config. mandatory' key determines how to handle the situation. If the value of this key is true, JRE will not run if the path to the properties file is invalid. NOTE: The 'JRE' directory in the file path may reflect the specific JRE release installed.

Fix Text

Specify the path to the deployment.properties file and set the mandatory configuration values. Navigate to the deployment.config file. /usr/java/jre/lib/deployment.properties Include the following keys in the configuration file: 'deployment.system.config=file:/usr/java/jre/lib/deployment.properties' 'deployment.system.config.mandatory=false'.

Check Content

Navigate to the deployment.config file. /usr/java/jre/lib/deployment.config If the configuration file does not contain 'deployment.system.config=file:/usr/java/jre/lib/deployment.properties', this is a finding. If the configuration file does not contain 'deployment.system.config.mandatory=false', this is a finding.

IA Controls

DCBP-1

A configuration file must be present to deploy properties for JRE.

Finding ID
JRE0070-UX
Rule ID
SV-43621r1_rule
Severity
Cat II
CCE
(None)
Group Title
JRE0070 Configuration file must be present
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

The deployment.config file is used for specifying the location and execution of system-level properties for the Java Runtime Environment. By default no deployment.config file exists; thus, no system-wide deployment.properties file exists. Without the deployment.config file, setting particular options for the Java control panel is impossible. NOTE: The 'JRE' directory in the file path may reflect the specific JRE release installed.

Fix Text

Create a JRE deployment configuration file. Navigate to the lib directory: /usr/java/jre/lib/ Create a configuration file entitled 'deployment.config'.

Check Content

Navigate to the lib directory: /usr/java/jre/lib/ If there is no configuration file entitled 'deployment.config', this is a finding.

IA Controls

DCBP-1

A properties file must be present to hold all the keys that establish properties within the Java control panel.

Finding ID
JRE0080-UX
Rule ID
SV-43620r2_rule
Severity
Cat II
CCE
(None)
Group Title
JRE0080 Properties file must exist
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

The deployment.properties file is used for specifying keys for the Java Runtime Environment. Each option in the Java control panel is represented by property keys. These keys adjust the options in the Java control panel based on the value assigned to that key. By default no deployment.properties file exists; thus, no system-wide deployment exists. Without the deployment.properties file, setting particular options for the Java control panel is impossible. NOTE: The 'JRE' directory in the file path may reflect the specific JRE release installed.

Fix Text

Create the Java deployment properties file. Navigate to the lib directory: /usr/java/jre/lib/ Create a properties file entitled 'deployment.properties'.

Check Content

Navigate to the lib directory: /usr/java/jre/lib/ If there is no properties file entitled 'deployment.properties', this is a finding.

IA Controls

DCBP-1

The version of the JRE running on the system must be the most current available.

Finding ID
JRE0090-UX
Rule ID
SV-51133r1_rule
Severity
Cat II
CCE
(None)
Group Title
JRE must be the most recent version available.
CCI
(None)
Target Key
(None)
Documentable
No
Discussion

The JRE is being continually updated by the vendor in order to address identified security vulnerabilities. Running an older version of the JRE can introduce security vulnerabilities to the system.

Fix Text

Test applications to ensure operational compatability with new version of Java. Install latest version of Java JRE.

Check Content

Open a terminal window and type the command; "java -version" sans quotes. The return value should contain Java build information; "Java (TM) SE Runtime Environment (build x.x.x.x)" Cross reference the build information on the system with the Oracle Java site to identify the most recent build available. http://www.oracle.com/technetwork/java/javase/downloads/index.html

Potential Impact

Java applications are runtime version dependant. Applications must be tested to ensure compatability with new Java Runtime version prior to applying upgrades to production environment. Failure to test application functionality with the newest version of JRE could result in undesireable results up to and including partial or full application failure.

Responsibility

System Administrator

IA Controls

DCBP-1

Java Runtime Environment (JRE) versions that are no longer supported by the vendor for security updates must not be installed on a system.

Finding ID
JRE9999-UX
Rule ID
SV-75505r2_rule
Severity
Cat I
CCE
(None)
Group Title
Unsupported Java Runtime Environment (JRE) applications
CCI
CCI-000366
Target Key
(None)
Documentable
No
Discussion

Java Runtime Environment (JRE) versions that are no longer supported by Oracle for security updates are not evaluated or updated for vulnerabilities leaving them open to potential attack. Organizations must transition to a supported Java Runtime Environment (JRE) version to ensure continued support.

Fix Text

Upgrade Java Runtime Environment (JRE) 7 for Unix software to a supported version.

Check Content

Oracle support for Java Runtime Environment (JRE) 7 for Unix ended 2015 April. If JRE 7 for Unix is installed on a system, this is a finding. If an extended support agreement providing security patches for the unsupported product is procured from the vendor, this finding may be downgraded to a CAT III.

IA Controls

DCSQ-1