Solaris user stack protection (UNIX)

Module: Object Integrity

This check reports Solaris agents that do not have user stack protection enabled. User stack protection is enabled by specifying set noexec_user_stack=1 in /etc/system. This check requires Soalris 6 or higher.

The following table lists the error message for the check.

Table: Error message for Solaris user stack protection

Message String ID and Category

Platform and Message Numeric ID

Message Title and Description

Additional Information


Category: Policy Compliance

UNIX (6238)

Title: User stack protection not enabled

Description:User stack protection is not enabled. To enable it, add set noexec_user_stack=1 to the /etc/system file.

Severity: red-4

Correctable: false

Snapshot Updatable: false

Template Updatable: false

Information Field Format: [%s]