AIX7-00-001138 - NFS file systems on AIX must be mounted with the nosuid option unless the NFS file systems contain approved setuid or setgid programs.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The nosuid mount option causes the system to not execute setuid files with owner privileges. This option must be used for mounting any file system not containing approved setuid files. Executing setuid files from untrusted file systems, or file systems not containing approved setuid files, increases the opportunity for unprivileged users to attain unauthorized administrative access.

Solution

For each NFS file systems that does not contain approved 'setuid' or 'setgid' files, add the 'nosuid' option, along with other mount options, to the 'options' field in '/etc/filesystems' using the following command:
# chfs -a options=ro,bg,hard,intr,nosuid,sec=sys <NFS_mount_point>

Note that the other mount options (other than the nosuid options) may be different among NFS mounts.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_IBM_AIX_7-x_V2R6_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002233, Rule-ID|SV-215234r508663_rule, STIG-ID|AIX7-00-001138, STIG-Legacy|SV-101609, STIG-Legacy|V-91511, Vuln-ID|V-215234

Plugin: Unix

Control ID: 08f007716c26f5adac5869f92b98c062bf3f285383c7c24e387fb3ccbc550b02