Unauthorized user can obtain information about process memory layout, making code execution protection techniques ineffective.
vulners.com/securityvulns/securityvulns:doc:21753