WN12-SO-000045 - The system must be configured to use Safe DLL Search Mode.

Information

The default search behavior, when an application calls a function in a Dynamic Link Library (DLL), is to search the current directory, followed by the directories contained in the system's path environment variable. An unauthorized DLL, inserted into an application's working directory, could allow malicious code to be run on the system. Setting this policy value forces the system to search the %Systemroot% for the DLL before searching the current directory or the rest of the path.

Solution

Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> 'MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)' to 'Enabled'.

(See 'Updating the Windows Security Options File' in the STIG Overview document if MSS settings are not visible in the system's policy tools.)

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_2012_and_2012_R2_DC_V3R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, CSCv6|3.1, CSCv6|8, Rule-ID|SV-226309r794598_rule, STIG-ID|WN12-SO-000045, STIG-Legacy|SV-52920, STIG-Legacy|V-3479, Vuln-ID|V-226309

Plugin: Windows

Control ID: d66d2b48777b9e0838c15d2099706e3e7f85f36600823715997842334ab4c1c5