UCF STIG Viewer Logo

The system must use available memory address randomization techniques.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22576 GEN008420 SV-38399r1_rule ECSC-1 Low
Description
Successful exploitation of buffer overflow vulnerabilities relies in some measure to having a predictable address structure of the executing program. Address randomization techniques reduce the probability of a successful exploit.
STIG Date
HP-UX 11.23 Security Technical Implementation Guide 2015-12-02

Details

Check Text ( C-36787r1_chk )
This check is not applicable (NA) for HPUX.
Fix Text (F-32166r1_fix)
This check/fix is not applicable (NA) for HPUX.