wmp, this's for you :-)
Our company was audited. One of the vulnerabilities was:
setuid bit enabled"
set user ID upon execution is an access right flags that allow users to run an executable with the permissions of the executable's owner or group. Successful buffer overrun attacks on vulnerable applications allow the attacker to execute arbitrary code under the rights of the process being exploited.
Review these privileges to determine if this is a configuration according to the business needs.
I know what setuid is, but not clear if there's a global setup in AIX. As you see, the vulnerability is global "setuid bit enabled"
Any hint on how to solve this?