SQ14104
Detected Windows executable files that convert process heap to RWE thus nullifying the DEP vulnerability mitigation protection.
priority | CI/CD status | severity | effort | SAFE level | SAFE assessment |
---|---|---|---|---|---|
pass | high | medium | None | hardening: warning Reason: ineffective mitigations detected |
About the issueโ
Data Execution Prevention (DEP/NX) is a vulnerability mitigation option that protects the application stack, heap and other memory data ranges from being interpreted as code and executed. This mitigation is detected as enabled, but rendered ineffective due to configured global loader flags. Application explicitly asks the operating system to mark the heap as executable. Such configuration violates the code and data separation rules enforced by DEP.
How to resolve the issueโ
- Review the programming language linker options.
Incidence statisticsโ
ReversingLabs periodically collects and analyzes the contents of popular software package repositories for threat research purposes. Analysis results are used to calculate incidence statistics for issues (policy violations) that Spectra Assure can detect in software packages.
This section is updated when new data becomes available.
Total amount of packages analyzed
- RubyGems: 183K
- Nuget: 644K
- PyPi: 628K
- NPM: 3.72M
Recommended readingโ
- What is Data Execution Prevention (DEP)? (External resource - Microsoft)