SQ14104
Detected Windows executable files that convert process heap to RWE thus nullifying the DEP vulnerability mitigation protection.
priority | CI/CD status | severity | effort | RL level | RL assessment |
---|---|---|---|---|---|
pass | high | medium | None | hardening: warning Reason: ineffective mitigations found |
About the issueโ
Data Execution Prevention (DEP/NX) is a vulnerability mitigation option that protects the application stack, heap and other memory data ranges from being interpreted as code and executed. This mitigation is detected as enabled, but rendered ineffective due to configured global loader flags. Application explicitly asks the operating system to mark the heap as executable. Such configuration violates the code and data separation rules enforced by DEP.
How to resolve the issueโ
- Review the programming language linker options.
Incidence statisticsโ
Not relevant for this type of issue.
Recommended readingโ
- What is Data Execution Prevention (DEP)? (External resource - Microsoft)