The following procedures find risky executables on the system and prevent programs from exploiting process heaps and executable stacks.
How to Find Files With Special File Permissions locates files with the setuid bit set, but that are not owned by the root user.
Protecting the Process Heap and Executable Stacks From Compromise in Securing Systems and Attached Devices in Oracle Solaris 11.3 prevents programs from malicious software attacks.