Описание
Microsoft Enhanced Mitigation Experience Toolkit (EMET) before 4.0 uses predictable addresses for hooked functions, which makes it easier for context-dependent attackers to defeat the ASLR protection mechanism via a return-oriented programming (ROP) attack.
Ссылки
- Patch
- Patch
Уязвимые конфигурации
Конфигурация 1Версия до 3.0 (включая)
cpe:2.3:a:microsoft:enhanced_mitigation_experience_toolkit:*:*:*:*:*:*:*:*
EPSS
Процентиль: 95%
0.18333
Средний
4.3 Medium
CVSS2
Дефекты
CWE-200
Связанные уязвимости
github
больше 3 лет назад
Microsoft Enhanced Mitigation Experience Toolkit (EMET) before 4.0 uses predictable addresses for hooked functions, which makes it easier for context-dependent attackers to defeat the ASLR protection mechanism via a return-oriented programming (ROP) attack.
EPSS
Процентиль: 95%
0.18333
Средний
4.3 Medium
CVSS2
Дефекты
CWE-200