Microsoft Enhanced Mitigation Experience Toolkit (EMET) before 4.0 uses predictable addresses for hooked functions, which makes it easier for context-dependent attackers to defeat the ASLR protection mechanism via a return-oriented programming (ROP) attack.
CPE | Name | Operator | Version |
---|---|---|---|
enhanced_mitigation_experience_toolkit | le | 3.0 |