WA000-WI050 - Unused and vulnerable script mappings in IIS are not removed or set to the 404.dll - '.bat mappings'

Information

Vulnerability Key: V0002267
IA Controls: ECSC-1 Security Configuration Compliance
Categories: 12.4 CM Process
Severity: Category I
Ref: WEB SERVER SECURITY TECHNICAL IMPLEMENTATION GUIDE Section 2.1, Web Site Administration Policies & Procedures, With
Amendments and Corrections incorporated in red italics, Guide to the Secure Configuration and Administration of Microsoft
Internet Information
IIS file extensions which require server-side processing, but which have been deemed vulnerable,
include .htr, .htw, .ida, .idc, .idq, .printer, .shtml, .shtm, .bat, .cmd and .stm. Requests to these file types
can exploit a stack buffer overflow weakness in the ism.dll, httpodbc.dll, and ssinc.dll. A widely
available exploit exists which allows a malicious user to gain administrative access to Windows
NT/Windows 2000 host servers. These mappings have been exploited by malicious users to gain
privileged access to web servers.

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7

Plugin: Windows

Control ID: 2b7ffda96679e5b577b6e5f78b5e874e8065dcd56f9dbfb9679861d2afd7ff0f