When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Windows XP SP2 Still Vulnerable To Memory Attacks

Russian security outfit, Maxpatrol, have discovered a way to defeat Microsoft® Windows® XP SP2 Heap protection and Data Execution Prevention mechanism.

Data execution prevention (DEP) is a set of hardware and software technologies that perform additional checks on memory to help protect against malicious code exploits. By default, software-enforced DEP only protects limited system binaries. Hardware-enforced DEP relies on processor hardware to mark memory with an attribute that indicates that code should not be executed from that memory.

Maxpatrol have published a full article on their discoveries. They claim that it's possible to implement arbitrary memory region write access (smaller or equal to 1016 bytes), Arbitrary code execution and DEP bypass.

The company have also published a solution named PTmsHORP. PTmsHORP allows restriction of lookaside list creation, governed by a special global flag. The company reported the problem to Microsoft on the 22nd December. We've contacted Microsoft about the problem and are awaiting a response.

View: Defeating Microsoft Windows XP SP2 Heap protection and DEP bypass announcement

View: Defeating Microsoft Windows XP SP2 Heap protection and DEP bypass article

Report a problem with article
Next Article

Microsoft To Rename Media Free XP

Previous Article

SCEE plans music download service for PlayStation Portable