DTOO128 - Publisher - Data Execution Prevention must be enforced.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Data Execution Prevention (DEP) is a set of hardware and software technologies performing additional checks on memory to help prevent malicious code from running on a system. The primary benefit of DEP is to help prevent code execution from data pages. Enabling this setting, turns off Data Execution Prevention. As a result, malicious code takes advantage of code injection or buffer overflow vulnerabilities possibly exploiting the computer.

Solution

Set the policy value for User Configuration -> Administrative Templates -> Microsoft Publisher 2010 -> Security -> Trust Center 'Turn off Data Execution Prevention' to 'Disabled'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Publisher_2010_V1R11_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001170, Rule-ID|SV-33926r1_rule, STIG-ID|DTOO128, Vuln-ID|V-26590

Plugin: Windows

Control ID: b31d2183b9fd5987f05ab18673aaeee470c48de2d2acea19675fc2a429d5c5a4