CVE-2013-6791

Microsoft Enhanced Mitigation Experience Toolkit (EMET) before 4.0 uses predictable addresses for hooked functions, which makes it easier for context-dependent attackers to defeat the ASLR protection mechanism via a return-oriented programming (ROP) attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:microsoft:enhanced_mitigation_experience_toolkit:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:59

Type Values Removed Values Added
References () http://blogs.technet.com/b/srd/archive/2013/06/17/emet-4-0-now-available-for-download.aspx - Patch () http://blogs.technet.com/b/srd/archive/2013/06/17/emet-4-0-now-available-for-download.aspx - Patch
References () http://en.nsfocus.com/advisories/1301.html - () http://en.nsfocus.com/advisories/1301.html -
References () http://www.securitytracker.com/id/1029411 - () http://www.securitytracker.com/id/1029411 -

Information

Published : 2013-11-29 15:55

Updated : 2025-04-11 00:51


NVD link : CVE-2013-6791

Mitre link : CVE-2013-6791

CVE.ORG link : CVE-2013-6791


JSON object : View

Products Affected

microsoft

  • enhanced_mitigation_experience_toolkit
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor