Skip to main content

SQ14114

Detected Windows executable files that do not implement the buffer overrun vulnerability mitigation protection.

priorityCI/CD statusseverityeffortRL levelRL assessment
passhighmediumNonehardening: warning
Reason: baseline mitigations missing

About the issueโ€‹

Buffer overrun protection (Stack Guard) is a vulnerability mitigation option that prevents stack-based memory corruptions. Special values, called stack cookies, are inserted in the stack immediately before the return address value. Code flow protection is achieved by monitoring for unexpected stack cookie value changes. When a function is suspected to return to an address other than the calling one, the vulnerability mitigation triggers and terminates the application execution. This is a runtime mitigation option that selectively protects functions deemed to be at risk from memory corruption attacks by the programming language toolchain.

How to resolve the issueโ€‹

  • In Microsoft VisualStudio, you can enable buffer overrun protection mitigation by setting the linker option /GS to ON.

Incidence statisticsโ€‹

ReversingLabs periodically collects and analyzes the contents of popular software package repositories for threat research purposes.

For every repository, the chart shows the percentage of projects that triggered the software assurance policy. In other words, it shows how many projects were found to have the specific issue described on this page.

The percentages are calculated from the total amount of packages analyzed:

  • RubyGems: 174K
  • Nuget: 189K
  • PyPi: 403K
  • NPM: 2.1M