Solaris Buffer Overflow Protection

One of the most common ways for hackers to break into a Solaris system is to exploit buffer overflows. How do I turn on buffer overflow protection under Solaris UNIX operating system just like CentOS/Redhat Linux system?

Sun Solaris UNIX kernel provide protection against buffer overflows. It can detect, log, and prevent such attempts to execute code on the stack. You need update the /etc/system file, which provides a static mechanism for adjusting the values of kernel parameters. Values specified in this file are read at boot time and are applied. Any changes that are made to the file are not applied to the operating system until the system is rebooted.

Open /etc/system file, enter:
# cp /etc/system /etc/system.old
# vi /etc/system

Add / modify the following lines:

set noexec_user_stack=1
set noexec_user_stack_log=1

Where,

  • noexec_user_stack=1 : Turn on buffer overflow protection
  • set noexec_user_stack_log=1 : Enable the Logging of Executable Stack Messages.

Finally, reboot the system:
# init 6


🐧 Get the latest tutorials on Linux, Open Source & DevOps via RSS feed or Weekly email newsletter.

🐧 2 comments so far... add one


CategoryList of Unix and Linux commands
Disk space analyzersdf duf ncdu pydf
File Managementcat cp mkdir tree
FirewallAlpine Awall CentOS 8 OpenSUSE RHEL 8 Ubuntu 16.04 Ubuntu 18.04 Ubuntu 20.04
Modern utilitiesbat exa
Network UtilitiesNetHogs dig host ip nmap
OpenVPNCentOS 7 CentOS 8 Debian 10 Debian 8/9 Ubuntu 18.04 Ubuntu 20.04
Package Managerapk apt
Processes Managementbg chroot cron disown fg glances gtop jobs killall kill pidof pstree pwdx time vtop
Searchingag grep whereis which
User Informationgroups id lastcomm last lid/libuser-lid logname members users whoami who w
WireGuard VPNAlpine CentOS 8 Debian 10 Firewall Ubuntu 20.04
2 comments… add one

Leave a Reply

Your email address will not be published.

Use HTML <pre>...</pre> for code samples. Still have questions? Post it on our forum