From: "Default User" <
[email protected]>
|
| No.
|
| Additional protection can be gained by enabling DEP on Windows XP SP2 or
| 2003 Server OS.
|
|
http://support.microsoft.com/kb/875352#kb2
| "The primary benefit of DEP is that it helps prevent code execution from
| data pages, such as the default heap pages, various stack pages, and memory
| pool pages. Typically, code is not executed from the default heap and the
| stack. Hardware-enforced DEP detects code that is running from these
| locations and raises an exception when execution occurs. If the exception
| is unhandled, the process will be stopped. Execution of code from protected
| memory in kernel mode causes a Stop error.
|
| DEP can help block a class of security intrusions. Specifically, DEP can
| help block a malicious program in which a virus or other type of attack has
| injected a process with additional code and then tries to run the injected
| code. On a system with DEP, execution of the injected code causes an
| exception. Software-enforced DEP can help block programs that take
| advantage of exception-handling mechanisms in Windows."
|
| Your best bet is to "turn on DEP for all programs".
|
| There is still no guarantees with DEP, but it is a far more proactive way
| of blocking zero_day_vulnerabilities than waiting for M$ to create a patch.
http://www.microsoft.com/technet/security/advisory/912840.mspx
Choose "Frequently Asked Questions"
Q: I have DEP enabled on my system, does this help mitigate the vulnerability?
A: Software based DEP does not mitigate the vulnerability. However, Hardware based DEP may
work when enabled: please consult with your hardware manufacturer for more information on
how to enable this and whether it can provide mitigation.