UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Automated file system mounting tools must not be enabled unless needed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22577 GEN008440 SV-26964r1_rule ECSC-1 Low
Description
Automated file system mounting tools may provide unprivileged users with the ability to access local media and network shares. If this access is not necessary for the system’s operation, it must be disabled to reduce the risk of unauthorized access to these resources.
STIG Date
Solaris 9 X86 Security Technical Implementation Guide 2012-05-25

Details

Check Text ( C-27911r1_chk )
If the autofs service is needed, this vulnerability is not applicable.
Check if the autofs service is running.
ps -ef | grep autofs
If an autofs/automount process is listed this is a finding.
Fix Text (F-24226r1_fix)
Stop and disable the autofs service.
# /etc/init.d/autofs stop
# mv /etc/rc2.d/S74autofs /etc/rc2.d/xxxS74autofs