wmp, this's for you :-)
Our company was audited. One of the vulnerabilities was:
"AIX-VULN005
setuid bit enabled"
set user ID upon execution is an access right flags that allow users to run an executable with the permissions of the executable's owner or group. Successful buffer overrun attacks on vulnerable applications allow the attacker to execute arbitrary code under the rights of the process being exploited.
MEDIUM
HIGH
Review these privileges to determine if this is a configuration according to the business needs.
I know what setuid is, but not clear if there's a global setup in AIX. As you see, the vulnerability is global "setuid bit enabled"
Any hint on how to solve this?
Thanks.
Our community of experts have been thoroughly vetted for their expertise and industry experience.