Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

Is noexec_user_stack supported in Solaris x86?

Solaris supported x86
0
Posted

Is noexec_user_stack supported in Solaris x86?

0

No. You can set it but it won’t do anything on Intel. On SPARC, it prevents execution of code that was placed on the stack. This is a popular technique used to gain unauthorized root access to systems, locally or remotely, by executing arbitrary code as root. This is possible with poorly-written programs that have missing overflow checks. To enable stack protection, add the following to /etc/system and reboot: set noexec_user_stack = 1 set noexec_user_stack_log = 1 Unfortuntely it’s ignored on the Intel Architecture, because it doesn’t have the concept of pages having execute permissions. (SPARC and AMD’s Opteron do, so it’s possible that a future release of Solaris x86 may support it when running on certain AMD CPU’s, but not on Intel ones.) This feature has been the default beginning with Solaris 9.

0

Yes, but only for AMD64 (Operon) on Solaris 10 or higher. For 32 bit x86, you can set it but it won’t do anything. On SPARC and AMD64, it prevents execution of code that was placed on the stack. This is a popular technique used to gain unauthorized root access to systems, locally or remotely, by executing arbitrary code as root. This is possible with poorly-written programs that have missing overflow checks. To enable stack protection, add the following to /etc/system set noexec_user_stack = 1 set noexec_user_stack_log = 1 and reboot with /usr/sbin/shutdown -i6 Unfortunately the flag is ignored on Intel 32-bit architecture, because it doesn’t have the concept of pages having execute permissions. (SPARC and AMD’s Opteron and Athlon support it though).

0

Yes, but only for AMD64 (Operon) on Solaris 10 or higher. For 32 bit x86, you can set it but it won’t do anything. On SPARC and AMD64, it prevents execution of code that was placed on the stack. This is a popular technique used to gain unauthorized root access to systems, locally or remotely, by executing arbitrary code as root. This is possible with poorly-written programs that have missing overflow checks. To enable stack protection, add the following to /etc/system set noexec_user_stack = 1 set noexec_user_stack_log = 1 and reboot with /usr/sbin/init 6 With Solaris 10 release it is clear that Solaris security is superior and architecturally is reached more advanced stage, especially in RBAC area and light-weight VM area (zones), than Linux security. I would say that Solaris 10 RBAC implementation and zones make it the first XXI century Unix. Red Hat implementation of SELinux in version 4 of Red Hat Enterprise makes it more competitive with Solaris then Suse, but still this is a less

0

No. You can set it but it won’t do anything on Intel. On SPARC, it prevents execution of code that was placed on the stack. This is a popular technique used to gain unauthorized root access to systems, locally or remotely, by executing arbitrary code as root. This is possible with poorly-written programs that have missing overflow checks. To enable stack protection, add the following to /etc/system and reboot: set noexec_user_stack = 1 set noexec_user_stack_log = 1 Unfortunately it’s ignored on the Intel Architecture, because it doesn’t have the concept of pages having execute permissions. (SPARC and AMD’s Opteron do, so it’s possible that a future release of Solaris x86 may support it when running on certain AMD CPU’s, but not on Intel ones.) This feature has been the default beginning with Solaris 9.

0

Yes, but only for AMD64 (Operon) on Solaris 10 or higher. For 32 bit x86, you can set it but it won’t do anything. On SPARC and AMD64, it prevents execution of code that was placed on the stack. This is a popular technique used to gain unauthorized root access to systems, locally or remotely, by executing arbitrary code as root. This is possible with poorly-written programs that have missing overflow checks. To enable stack protection, add the following to /etc/system set noexec_user_stack = 1 set noexec_user_stack_log = 1 and reboot with /usr/sbin/init 6 Unfortunately the flag is ignored on Intel 32-bit architecture, because it doesn’t have the concept of pages having execute permissions. (SPARC and AMD’s Opteron and Athlon support it though).

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123