CVE-2013-6791 in Microsoft Enhanced Mitigation Experience Toolkit EMET
Résumé (Anglaise)
Microsoft Enhanced Mitigation Experience Toolkit (EMET) before 4.0 uses predictable addresses for hooked functions, which makes it easier for context-dependent attackers to defeat the ASLR protection mechanism via a return-oriented programming (ROP) attack.
Réserver
13/11/2013
Divulgation
29/11/2013
Entrées
VulDB provides additional information and datapoints for this CVE: