Performing Optional Security Tasks

You can implement several tasks to provide a more complete security solution for your Solaris systems. You can choose to implement a few of them or none of them; it all depends on your company's security requirements.

Executing Code from the Stack

Several of today's exploits depend on the many security holes introduced by one system flaw: the ability to execute code from the stack. Many of these exploits use a bug known as a buffer overflow. The exploit code overflows a buffer in a way that lets the buffer overflow write code into the stack space. After this code is placed in the stack space, the exploit can execute arbitrary code on the target system.

You can secure your system against a stack-based buffer ...

Get CCIE Practical Studies: Security (CCIE Self-Study) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.