Windows Data Execution Prevention

  • Date: October 20, 2013
  • Article by: Joe Malewicki

ISSUE: Data Execution Prevention (DEP) is not currently enabled for essential Windows programs and services on all servers
RISK: The primary benefit of DEP is that it helps prevent code execution from data pages, such as the default heap pages, various stack pages, and memory pool pages. Typically, code is not executed from the default heap and the stack. Hardware-enforced DEP detects code that is running from these locations and raises an exception when execution occurs. If the exception is unhandled, the process will be stopped. Execution of code from protected memory in kernel mode causes a Stop error.
SOLUTION: Correct the DEP Settings per standard Windows operating tuning.
APPLICABLE VERSIONS: 9.3.x, 11.1.1.x,,,,,

Share me

OWSM Blog Part 1 – Installation and Configuration of DRM Web Services API with Oracle EPM 11.2

  • Date: Nov 18, 2020
  • Article by: Brad Spelman
Read More

October Patch Updates Breaks Shared Services.

  • Date: Oct 28, 2020
  • Article by: Jeff Henkel
Read More