WA000-WI050 - Unused and vulnerable script mappings in IIS are not removed or set to the 404.dll - 'Internet Printing Disallowed'

Information

Vulnerability Key: V0002267
IA Controls: ECSC-1 Security Configuration Compliance
Categories: 12.4 CM Process
Severity: Category I
Ref: WEB SERVER SECURITY TECHNICAL IMPLEMENTATION GUIDE Section 2.1, Web Site Administration Policies & Procedures, With
Amendments and Corrections incorporated in red italics, Guide to the Secure Configuration and Administration of Microsoft
Internet Information
IIS file extensions which require server-side processing, but which have been deemed vulnerable,
include .htr, .htw, .ida, .idc, .idq, .printer, .shtml, .shtm, .bat, .cmd and .stm. Requests to these file types
can exploit a stack buffer overflow weakness in the ism.dll, httpodbc.dll, and ssinc.dll. A widely
available exploit exists which allows a malicious user to gain administrative access to Windows
NT/Windows 2000 host servers. These mappings have been exploited by malicious users to gain
privileged access to web servers.
If the script mapping is enabled ensure it is mapped to the 404.dll.

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7, CSCv6|9.1

Plugin: Windows

Control ID: 3bbeeddae964f9c6748df3077b07c5a0977ffef976cfc62e1add7a6dca23769b