Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22576 | GEN008420 | SV-37979r1_rule | ECSC-1 | Low |
Description |
---|
Successful exploitation of buffer overflow vulnerabilities relies in some measure to having a predictable address structure of the executing program. Address randomization techniques reduce the probability of a successful exploit. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2015-09-03 |
Check Text ( None ) |
---|
None |
Fix Text (F-32513r1_fix) |
---|
Edit the kernel boot parameters, or "/etc/sysctl.conf", and set exec-shield to "1". Reboot the system. |