Vuln kernel pax

From Atomicorp Wiki
Revision as of 16:21, 8 August 2011 by Mshinn (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Description

This means that your system is vulnerable to stack overflow attacks. The kernel is not robust to the type of vulnerability. ASL includes a special kernel that is immune to these weaknesses. If you are getting a kernel weakness vulnerability alert on your system then you are not running a secure kernel like ASL.

This means your system is vulnerable to a whole class of attacks that can cause the entire system to become compromised.

False Positives

There are no known False Positives for this.

Other Kernel Weakness Vulnerabilities

No Kernel Anonymous mapping randomization

No Kernel Heap randomization (ET_EXEC)

No Kernel Heap randomization (ET_DYN)

No Kernel Main executable randomization

No Kernel Shared library randomization

No Kernel Stack randomization

No Kernel Stack randomization

Personal tools