Securing Files and Verifying File Integrity in Oracle® Solaris 11.2

Exit Print View

Updated: July 2014
 
 

Protecting Against Programs With Security Risk

The following task map points to procedures that find risky executables on the system, and that prevent programs from exploiting an executable stack.

Task
Description
For Instructions
Find files with special permissions.
Locates files with the setuid bit set, but that are not owned by the root user.
Prevent executable stack from overflowing.
Prevents programs from exploiting an executable stack.
Prevent logging of executable stack messages.
Turns off logging of executable stack messages.