Protecting Against Programs With Security Risk
The following procedures find risky executables on the system and prevent programs from exploiting process heaps and executable stacks.
-
How to Find Files With Special File Permissions locates files with the
setuid
bit set, but that are not owned by theroot
user. -
Protecting the Process Heap and Executable Stacks From Compromise in Securing Systems and Attached Devices in Oracle Solaris 11.4 prevents programs from malicious software attacks.