What can be done to protect the system from overflow exploits?
An overflow occurs when a program writes to the memory address which is outside the intended data structure. The data structure in such cases is usually a fixed length buffer. It results in the corruption of the data. The default behaviour of the solaris kernel is to map the system stack RWX. A non-executable stack gets in the way of the certain classes of security bug exploits. A feature was added that would enable the administrators to disable the ‘X’ protection from a stack. To enable this the user needs to add the following to the /etc/system:
Post a Comment