UCF STIG Viewer Logo

Audio devices must be owned by root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1049 GEN002340 SV-27246r1_rule ECLP-1 Medium
Description
Globally Accessible audio and video devices have proven to be security hazards. There is software that can activate system microphones and video devices connected to user workstations and/or X terminals. Once the microphone has been activated, it is possible to eavesdrop on otherwise private conversations without the victim being aware of it. This action effectively changes the user's microphone to a bugging device.
STIG Date
Solaris 9 SPARC Security Technical Implementation Guide 2013-11-04

Details

Check Text ( None )
None
Fix Text (F-1203r2_fix)
Change the owner of the audio device.
# chown root