oval:mil.disa.fso.hpux11:def:334

compliance
unix

If compression is allowed in an SSH connection prior to authentication, vulnerabilities in the compression software could result in compromise of the system from an unauthenticated connection.

PlatformSourceComponent
HPUX 11-31STIG
  • HP-UX 11.31 Security Technical Implementation Guide
    • 1. I - Mission Critical Classified
    • 2. I - Mission Critical Public
    • 3. I - Mission Critical Sensitive
    • 4. II - Mission Support Classified
    • 5. II - Mission Support Public
    • 6. II - Mission Support Sensitive
    • 7. III - Administrative Classified
    • 8. III - Administrative Public
    • 9. III - Administrative Sensitive

Cyberisc is a full featured, FREE, compliance and vulnerability scanner that makes it easy to enforce industry standard security configurations across your infrastructure in minutes. Automate your compliance and vulnerability scans and increase your visibility of insecure systems. Harden your infrastructure by patching and configuring your systems with industry standard security configurations. Audit all your systems and meet government & industry regulations.