CVE-2013-6791

Microsoft Enhanced Mitigation Experience Toolkit (EMET) before 4.0 uses predictable addresses for hooked functions, which makes it easier for context-dependent attackers to defeat the ASLR protection mechanism via a return-oriented programming (ROP) attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:microsoft:enhanced_mitigation_experience_toolkit:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2013-11-29 15:55

Updated : 2024-02-04 18:16


NVD link : CVE-2013-6791

Mitre link : CVE-2013-6791

CVE.ORG link : CVE-2013-6791


JSON object : View

Products Affected

microsoft

  • enhanced_mitigation_experience_toolkit
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor