WG380 - Vulnerable programs have not been removed from the web server. - '.exe or .cgi search'

Information

Vulnerability Key: V0002266
IA Controls: ECSC-1 Security Configuration Compliance
Categories: 11.4 Disposition
Severity: Category II
Ref: WEB SERVER SECURITY TECHNICAL IMPLEMENTATION GUIDE Section 4.1, Web Site Administration Policies & Procedures, With
Amendments and Corrections incorporated in red italics
Several filenames and programs designed to enhance web functionality have been identified in
connection with the intrusions and vulnerabilities specific to web servers. The presence of any of
these files on your system should be reviewed carefully because they indicate that the web server
is vulnerable to well-known malicious exploits. In many cases these vulnerabilities are found in the
example installed with systems. More recently, trojans have been copied to web servers via a
corrupt web request which compromises the contents of main memory on the server. Microsoft
Internet Information Server (IIS) web sites can be configured to allow password change requests
from remote users. By sending a malformed request to '_AuthChangeUrl', a remote attacker can
cause a denial of service attack against IIS. When this attack is performed against IIS 4.0, the
program stops servicing requests completely, and CPU utilization increases to 100 percent. IIS
5.0 is not as severely affected, although it stops responding to password change requests.
NOTE: Nessus did not perform this check as it requires manual verification via interviewing the SA to determine that the system
does not contain any vulnerable software.
NOTE: This check only searches the 'C:' drive, if the system has multiple drives ensure each drive doesn't contain compilers.

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7

Plugin: Windows

Control ID: 9bfce6fde3e54be37c53d6ddfe00d84b3e18a68556e5dc1994da494776249bb3