1. Song Tom
  2. PowerBuilder
  3. Friday, 16 August 2024 09:23 AM UTC

Dear Appeon:

There is another security issue to ask your advice, Is there any way for Powerbuiilder to prevent code injection by marking memory regions as non-executable? as we known ASLR, DEP, and SafeSEH are considered best practices for all developers to implement as they help protect against users exploiting insecure code. DEP helps to prevent code injection by marking memory regions as non-executable as protection against buffer overflows. Is there any way for Powerbuilder to protect memory against buffer overflow like that? A penetration test suggest us to compile application with some additional security measures to protect against code exploitation (in this case with DEP), Can give us some advice on that?

Julie Jiang @Appeon Accepted Answer Pending Moderation
  1. Monday, 19 August 2024 06:46 AM UTC
  2. PowerBuilder
  3. # 1

Hi Song, 

Thanks for your suggestion!  Please note that our team is already working on it and plan to deliver the feature (supporting advanced executable security such as CFG, ASLR, DEF and SafeSEH) in version 2025 R2.

Best regards, Julie

Comment
  1. Andreas Mykonios
  2. Monday, 19 August 2024 07:20 AM UTC
That's great.

Andreas.
  1. Helpful
There are no comments made yet.
  • Page :
  • 1


There are no replies made for this question yet.
However, you are not allowed to reply to this question.
We use cookies which are necessary for the proper functioning of our websites. We also use cookies to analyze our traffic, improve your experience and provide social media features. If you continue to use this site, you consent to our use of cookies.