CVE-2013-6791
29.11.2013, 15:55
Microsoft Enhanced Mitigation Experience Toolkit (EMET) before 4.0 uses predictable addresses for hooked functions, which makes it easier for context-dependent attackers to defeat the ASLR protection mechanism via a return-oriented programming (ROP) attack.Enginsight
Vendor | Product | Version |
---|---|---|
microsoft | enhanced_mitigation_experience_toolkit | 𝑥 ≤ 3.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References