Skip to main content

SQ14104

Detected Windows executable files that convert process heap to RWE thus nullifying the DEP vulnerability mitigation protection.

priorityCI/CD statusseverityeffortSAFE levelSAFE assessment
passhighmediumNonehardening: warning
Reason: ineffective mitigations detected

About the issueโ€‹

Data Execution Prevention (DEP/NX) is a vulnerability mitigation option that protects the application stack, heap and other memory data ranges from being interpreted as code and executed. This mitigation is detected as enabled, but rendered ineffective due to configured global loader flags. Application explicitly asks the operating system to mark the heap as executable. Such configuration violates the code and data separation rules enforced by DEP.

How to resolve the issueโ€‹

  • Review the programming language linker options.

Incidence statisticsโ€‹

ReversingLabs periodically collects and analyzes the contents of popular software package repositories for threat research purposes. Analysis results are used to calculate incidence statistics for issues (policy violations) that Spectra Assure can detect in software packages.

This section is updated when new data becomes available.

Total amount of packages analyzed

  • RubyGems: 183K
  • Nuget: 644K
  • PyPi: 628K
  • NPM: 3.72M
Statistics are not collected for the SQ14104 policy at this time, or not applicable to this type of issue.