CVE-2013-6791 in Microsoft Enhanced Mitigation Experience Toolkit EMETinformation

Résumé (Anglaise)

Microsoft Enhanced Mitigation Experience Toolkit (EMET) before 4.0 uses predictable addresses for hooked functions, which makes it easier for context-dependent attackers to defeat the ASLR protection mechanism via a return-oriented programming (ROP) attack.

Réserver

13/11/2013

Divulgation

29/11/2013

Entrées

VulDB provides additional information and datapoints for this CVE:

Might our Artificial Intelligence support you?

Check our Alexa App!