What can be done to protect the system from overflow exploits?

An overflow occurs when a program writes to the memory address which is outside the intended data structure. The data structure in such cases is usually a fixed length buffer. It results in the corruption of the data. The default behaviour of the solaris kernel is to map the system stack RWX. A non-executable stack gets in the way of the certain classes of security bug exploits. A feature was added that would enable the administrators to disable the ‘X’ protection from a stack. To enable this the user needs to add the following to the /etc/system:



To be able to use this feature certain prerequisites are necessary such as hardware support, also 32 bit applications which are being run on a 64 bit kernel do not work.

No comments:

Post a Comment

The advantages of Outsourcing Web Development Services

In the present digital world, acquiring a solid web presence is essential for companies to flourish. A well designed site is much much more ...