DEP disabled
ID PE019 Level CRITICAL Category Security
Description
DEP (data execution prevention) is disabled. This allows self-modifying code (including exploits) to be executed easily even from the write-only memory without the need to manipulate memory attributes.
Mitigation
- Make sure the executable does not try to execute any code from the writable memory. If you do need to execute dynamically generated code (e.g. JIT), first change the memory attributes to read-execute.
If using Visual C++:
- Pass the
/NXCOMPAT
option to the linker when building the executable.
Arguments
This rule has no output arguments.
Loading...
Unable to load this documentation page.