Hackers Beware | DEP's here

This is something that has been around for years and is a simple solution to avoid hackers executing code using buffer overflows/overruns.

From the MSKB 875352
Data Execution Prevention (DEP) is a set of hardware and software technologies that perform additional checks on memory to help prevent malicious code from running on a system. In Microsoft Windows XP Service Pack 2 (SP2) and Microsoft Windows XP Tablet PC Edition 2005, DEP is enforced by hardware and by software.The primary benefit of DEP is to help prevent code execution from data pages. Typically, code is not executed from the default heap and the stack. Hardware-enforced DEP detects code that is running from these locations and raises an exception when execution occurs. Software-enforced DEP can help prevent malicious code from taking advantage of exception-handling mechanisms in Windows.


Software DEP is crap! You need to have a DEP at a processor/bios level. To check if you do, just try this little app by Steve Gibson.




If you're interested in knowing more about DEP, listen to Leo's Security Now! Episode# 78. Buffer Overruns can be understood by listening to Episode# 39. SN! podcasts can be found at http://www.grc.com/securitynow.htm and the RSS podcast is at http://leoville.tv/podcasts/sn.xml

Share with us if you have DEP.

Comments

Popular posts from this blog

multi-screen mania!

CrossEngine: Seach Engine Mashup