Secunia CSI7
About us
Careers
Memberships
Newsroom
Contact us
Blog
News
Articles

DEP / ASLR Neglected in Popular Programs

Get this blog as an RSS Feed
Two security mechanisms that are really being promoted when it comes to later versions of Windows are DEP (Data Execution Prevention) and ASLR (Address Space Layout Randomization).
18:45 CET on the 1st July 2010
Entry written by Carsten Eiram.

Two security mechanisms that are really being promoted when it comes to later versions of Windows are DEP (Data Execution Prevention) and ASLR (Address Space Layout Randomization).

These two security mechanisms can make it very hard for attackers to create reliable exploits for a vulnerability in an application and, as a result, many users feel quite safe when running these later version of Windows.

Is that feeling of safety just an illusion, though? It is if the used applications do not properly support the two security mechanisms.

Secunia Research recently gathered information on the 50 most popular non-Microsoft applications installed on Windows users' systems based on our PSI statistics. We then decided to take a closer look at 16 of them to determine if they properly supported DEP and ASLR.

Unfortunately, our research shows that most popular, non-Microsoft applications do not implement these features properly and, therefore, don't offer users the expected protection.

More information on our research can be found here.

Stay Secure,

Carsten Eiram
Chief Security Specialist

Discuss this blog entry
A new thread in our forum is created. Activate the thread by commenting/discussing below.
Subject: DEP / ASLR Neglected in Popular Programs
 
User Message
[+]

marc_ochsenmeier

RE: DEP / ASLR Neglected in Popular Programs
This reply has been minimised due to a negative Relevancy Score.
ddmarshall RE: DEP / ASLR Neglected in Popular Programs
Dedicated Contributor 29th Jul, 2010 14:59
Score: 1208
Posts: 960
User Since: 8th Nov 2008
System Score: 98%
Location: UK
Last edited on 29th Jul, 2010 14:59
Microsoft have announce the upcoming release of version 2 of the Enhanced Mitigation Experience Toolkit. This allows the enforcement of DEP/ASLR on programs that do not have these mitigations implemented. Of course, applications need to be tested to ensure they work correctly with the mitigations in place.

http://blogs.technet.com/b/srd/archive/2010/07/28/...
http://technet.microsoft.com/en-us/security/ff8595...

--
This answer is provided “as-is.” You bear the risk of using it.
Was this reply relevant?
+5
-0

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability