Performing Optional Security Tasks

You can implement several tasks to provide a more complete security solution for your Solaris systems. You can choose to implement a few of them or none of them; it all depends on your company's security requirements.

Executing Code from the Stack

Several of today's exploits depend on the many security holes introduced by one system flaw: the ability to execute code from the stack. Many of these exploits use a bug known as a buffer overflow. The exploit code overflows a buffer in a way that lets the buffer overflow write code into the stack space. After this code is placed in the stack space, the exploit can execute arbitrary code on the target system.

You can secure your system against a stack-based buffer ...

Get CCIE Practical Studies: Security (CCIE Self-Study) now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.