Vulnerability Description
Microsoft Enhanced Mitigation Experience Toolkit (EMET) before 4.0 uses predictable addresses for hooked functions, which makes it easier for context-dependent attackers to defeat the ASLR protection mechanism via a return-oriented programming (ROP) attack.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Enhanced Mitigation Experience Toolkit | <= 3.0 |
Related Weaknesses (CWE)
References
- http://blogs.technet.com/b/srd/archive/2013/06/17/emet-4-0-now-available-for-dowPatch
- http://en.nsfocus.com/advisories/1301.html
- http://www.securitytracker.com/id/1029411
- http://blogs.technet.com/b/srd/archive/2013/06/17/emet-4-0-now-available-for-dowPatch
- http://en.nsfocus.com/advisories/1301.html
- http://www.securitytracker.com/id/1029411
FAQ
What is CVE-2013-6791?
CVE-2013-6791 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Microsoft Enhanced Mitigation Experience Toolkit (EMET) before 4.0 uses predictable addresses for hooked functions, which makes it easier for context-dependent attackers to defeat the ASLR protection ...
How severe is CVE-2013-6791?
CVE-2013-6791 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6791?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Enhanced Mitigation Experience Toolkit.