On 25 Feb 99, at 17:44, Moscoe, Corey wrote:

> Does anyone know what are the consequences/risks of having DCOM
> enabled in an Internet Firewall.  I know that ISS identifies that as
> a vulnerability, but I do not truly understand how this vulnerability
> could be exploited or are there other controls that I could implement
> which would mitigate this risk.  Unfortunately, I am not very
> technical so any laymen terms would be appreciated.  Thank you. 

  DCOM is (Distributed) Component Object Model.  Think of it as an 
object-oriented cousin to RPC.
  Like RPC, it can be useful for building networked applications.
  Like RPC, it can be dangerous if an outsider knows your machine has a 
common component installed whose functions include, say, delete file, 
transmit file, modify configuration, or other useful/dangerous 
operations.
  I don't think theres anyone in the world who knows what every third-
party DCOM module installed on their PC is capable of.


David G
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to