Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-1049 | GEN002340 | SV-37575r2_rule | Medium |
Description |
---|
Audio and video devices globally accessible have proven to be another security hazard. There is software that can activate system microphones and video devices connected to user workstations and/or X terminals. Once the microphone has been activated, it is possible to eavesdrop on otherwise private conversations without the victim being aware of it. This action effectively changes the user's microphone into a bugging device. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2016-06-01 |
Check Text ( C-36393r1_chk ) |
---|
Check the owner of audio devices. # ls -lL /dev/audio* /dev/snd/* If the owner of any audio device file is not root, this is a finding. |
Fix Text (F-31611r2_fix) |
---|
Edit the /etc/security/console.perms.d/50-default.perms file and comment the following line: |