WA000-WI050 - Unused and vulnerable script mappings in IIS are not removed or set to the 404.dll - 'Allowed Web Service Extensions'

Information

Vulnerability Key: V0002267
IA Controls: ECSC-1 Security Configuration Compliance
Categories: 12.4 CM Process
Severity: Category I
Ref: WEB SERVER SECURITY TECHNICAL IMPLEMENTATION GUIDE Section 2.1, Web Site Administration Policies & Procedures, With
Amendments and Corrections incorporated in red italics, Guide to the Secure Configuration and Administration of Microsoft
Internet Information
IIS file extensions which require server-side processing, but which have been deemed vulnerable,
include .htr, .htw, .ida, .idc, .idq, .printer, .shtml, .shtm, .bat, .cmd and .stm. Requests to these file types
can exploit a stack buffer overflow weakness in the ism.dll, httpodbc.dll, and ssinc.dll. A widely
available exploit exists which allows a malicious user to gain administrative access to Windows
NT/Windows 2000 host servers. These mappings have been exploited by malicious users to gain
privileged access to web servers.

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7, CSCv6|9.1

Plugin: Windows

Control ID: 721614e3ca0a729bfe000334421bb3fa27afdcb5e9c609c98d433430bf987aa7