My security people are telling me I need to lock down some DCOM
vulnerabilities on my exchange servers and gave me some documentation that
is pretty much greek to me.  I've attached a portion below.  Can anyone give
some suggestions as to what DCOM is and whether or not I want to make these
modifications to my site?

TIA!

Ben Parrnelli
Network Administrator
Comm & Data Directorate
MAGTF Training Command
Twentynine Palms, CA 92278

-------------------
DCOM Launch Permission: DCOM launch permission incorrect M

Launch permissions on the DCOM object allow non-administrators to launch
DCOM objects and execute code on the host.

False Positives: If a DCOM object implements internal security measures,
then this issue is not a vulnerability. Some of the objects that implement
internal security may be the ASP Transacted Script content object,
Transaction Context extended object, Transaction context object, and the Web
Application Manager object. These application names usually appear as
hexadecimal instead of text.

Remedy:
When the object uses DCOM's security, fortify the DCOM object's permissions
so that it continues to function under tightened security:

1. Run the dcomcnfg program in the %SystemRoot%/System32 folder.
2. Double-click the DCOM object that generated this vulnerability.
3. Click Security.
4. Edit the launch permissions. Some applications may require loose launch
permissions in order to function. Verify that the object in question still
functions properly after making any changes.
5. Click OK twice.

DCOM RunAs: DCOM RunAs value altered M

The DCOM RunAs Value was found to be altered. DCOM calls are executed under
the security context of the calling user by default. If the RunAs key has
been altered, the DCOM calls can be executed under the user context of the
currently logged in user, or as a third user. If this ability is not
controlled very carefully, it could provide a network user with the ability
to execute arbitrary code under another user context.

Remedy:
Remove the RunAs value to restore the user context to that of the calling
user.

To remove the RunAs value:

CAUTION: Use Registry Editor at your own risk. Any change using Registry
Editor may cause severe and irreparable damage and may require you to
reinstall your operating system. Internet Security Systems cannot guarantee
that problems caused by the use of Registry Editor can be solved.

1. Open Registry Editor. From the Windows NT Start menu, select Run, type
regedt32, and click OK.
2. Go to the HKEY_LOCAL_MACHINE\Software\Classes\AppID key.
3. Locate the subkey that has had the RunAs value inserted.
4. Delete the RunAs value.

_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Archives:               http://www.swynk.com/sitesearch/search.asp
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

Reply via email to