O'Reilly logo

CCIE Practical Studies: Security (CCIE Self-Study) by Raymond Morrow, Andrew G. Mason, Dmitry Bokotey

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Performing Optional Security Tasks

You can implement several tasks to provide a more complete security solution for your Solaris systems. You can choose to implement a few of them or none of them; it all depends on your company's security requirements.

Executing Code from the Stack

Several of today's exploits depend on the many security holes introduced by one system flaw: the ability to execute code from the stack. Many of these exploits use a bug known as a buffer overflow. The exploit code overflows a buffer in a way that lets the buffer overflow write code into the stack space. After this code is placed in the stack space, the exploit can execute arbitrary code on the target system.

You can secure your system against a stack-based buffer ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required