Protecting Against Programs With Security Risk
The following task map
points to procedures that find risky executables on the system, and that prevent
programs from exploiting an executable stack.
| | |
Find files with special permissions.
| Locates files with the setuid bit set, but that are
not owned by the root user.
|
|
Prevent executable stack from overflowing.
| Prevents programs from exploiting an executable stack.
|
|
Prevent logging of executable stack messages.
| Turns off logging of executable stack messages.
|
|
|