Query on Stack Protection Status

Mashuk Raza 20 Reputation points
2025-08-26T06:24:55.8766667+00:00

Hello Team,

While checking a Windows executable in Process Explorer, I noticed that Stack Protection is shown as Disabled, whereas DEP, ASLR, and CFG are enabled.

PFA screenshot for reference. Could you please confirm if this is expected behavior, and what the security impact is of Stack Protection being disabled?

Developer technologies | C++
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Bruce (SqlWork.com) 79,601 Reputation points Volunteer Moderator
    2025-08-26T18:19:09.1266667+00:00

    in process explorer the Stack Protection refers to the Hardware-Enforced Stack Protection feature. It requires both the application enable and the feature be enabled in the os.

    feature:

    https://learn.microsoft.com/en-us/windows-server/security/kernel-mode-hardware-stack-protection

    code support:

    https://techcommunity.microsoft.com/blog/windowsosplatform/developer-guidance-for-hardware-enforced-stack-protection/2163340

    1 person found this answer helpful.

  2. Omkara Varshitha Kunapalli (INFOSYS LIMITED) 385 Reputation points Microsoft External Staff
    2025-08-26T06:40:39.5733333+00:00

    Thanks for reaching out !

    **Stack Protection Disabled in Process Explorer
    **

    1. Stack Protection is a compile-time security feature that helps detect and prevent stack-based buffer overflows. It is typically enabled using the /GS compiler flag during compilation.
    2. If the executable is a .NET managed application, Stack Protection may show as Disabled in Process Explorer. This is expected behavior because managed code uses different memory safety mechanisms.
    3. If the executable is a native (unmanaged) application, Stack Protection being disabled could indicate that it was compiled without the /GS flag. This may expose the application to stack-based buffer overflow risks.
    4. The presence of DEP, ASLR, and CFG indicates that other runtime protections are active, which significantly reduce exploitability.
    5. Security Impact: For managed applications, this is not a concern. For native applications, it is recommended to enable Stack Protection during compilation to enhance security.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.