UCF STIG Viewer Logo

Audio devices must be owned by root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-1049 GEN002340 SV-27246r1_rule ECLP-1 Medium
Description
Globally Accessible audio and video devices have proven to be security hazards. There is software that can activate system microphones and video devices connected to user workstations and/or X terminals. Once the microphone has been activated, it is possible to eavesdrop on otherwise private conversations without the victim being aware of it. This action effectively changes the user's microphone to a bugging device.
STIG Date
SOLARIS 9 SPARC SECURITY TECHNICAL IMPLEMENTATION GUIDE 2015-10-01

Details

Check Text ( C-28271r1_chk )
Check the owner of audio devices.
# ls -lL /dev/audio
If the owner of any audio device file is not root, this is a finding.
Fix Text (F-1203r2_fix)
Change the owner of the audio device.
# chown root