DEP disabled

ID PE019 Level CRITICAL Category Security

Description

DEP (data execution prevention) is disabled. This allows self-modifying code (including exploits) to be executed easily even from the write-only memory without the need to manipulate memory attributes.

Mitigation

  • Make sure the executable does not try to execute any code from the writable memory. If you do need to execute dynamically generated code (e.g. JIT), first change the memory attributes to read-execute.

If using Visual C++:

Arguments

This rule has no output arguments.