ASL security

raqdedicados

Renowned Member
Nov 26, 2008
85
0
71
Hi there

Currently we re using plesk in centos 5 server, also we got the asl virtual package to protect them. is a package of security things to make plesk running thigher (sorry for my english!! ) the thing is that when we run the tests we got this


Critical Risk: Stack is executible. The system is vulnerable to buffer overrun class attacks.
High Risk: Kernel Heap randomisation test (ET_EXEC) failed.
High Risk: kernel check anonymous mappings are executable.
High Risk: Kernel check, bss is executable.
High Risk: Kernel check, data is executable.
High Risk: Kernel check, heap is executable.
High Risk: Kernel check, anonymous mapping (mprotect) is vulnerable.
High Risk
: Kernel check, Executable bss (mprotect) detected.
High Risk: Kernel check Executable data (mprotect), detected.
High Risk: Kernel check, Executable heap (mprotect) detected.
High Risk: Kernel check, Executable shared library bss (mprotect) detected.
High Risk: Kernel check, Executable shared library data (mprotect) detected.
High Risk: Kernel check, Executable stack (mprotect) detected.
High Risk: Kernel check, Executable shared library bss detected.
High Risk: Kernel check, Executable shared library data detected.
High Risk: Kernel check, Executable shared library data condition detected.

So, assuming that there is only one kernel (the HW NODE) there is a chance that can we fix this or there just false warnings or there 're things that matters to openvz-proxmox scheme to work ok and well we can't change them.

Thanks for doing this great job