Information
The system is audited for both suid and sgid files and programs.
An audit should be performed on the system to search for the presence of both suid and sgid files and programs. In order to prevent these files from being potentially exploited the suid and sgid permissions should be removed wherever possible.
Solution
Review the currently mounted filesystems:
mount
Un-mount all non-local filesystems and cdrom media:
unmount <mount point>
If there are non-local filesystems which cannot be un-mounted, use the following to find all suid and sgid files on local JFS/JFS2 filesystems only:
find / ( -fstype jfs -o -fstype jfs2 ) ( -perm -04000 -o -perm -02000 ) -type f -ls
If all non-local filesystems have been un-mounted:
find / ( -perm -04000 -o -perm -02000 ) -type f -ls
Review the files and where possible, use the chmod command to remove the appropriate suid or sgid bits:
chmod u-s <file>
chmod g-s <file>