Skip to main content

SQ14104

Detected Windows executable files that convert process heap to RWE thus nullifying the DEP vulnerability mitigation protection.

priorityCI/CD statusseverityeffortRL levelRL assessment
passhighmediumNonehardening: warning
Reason: ineffective mitigations found

About the issueโ€‹

Data Execution Prevention (DEP/NX) is a vulnerability mitigation option that protects the application stack, heap and other memory data ranges from being interpreted as code and executed. This mitigation is detected as enabled, but rendered ineffective due to configured global loader flags. Application explicitly asks the operating system to mark the heap as executable. Such configuration violates the code and data separation rules enforced by DEP.

How to resolve the issueโ€‹

  • Review the programming language linker options.

Incidence statisticsโ€‹

Not relevant for this type of issue.