Check: EMG1-002 Exch2K3
Microsoft Exchange Server 2003:
EMG1-002 Exch2K3
(in version v1 r5)
Title
Unneeded OMA E-mail Web Virtual Directory is not removed. (Cat III impact)
Discussion
To reduce the vectors through which a server can be attacked, unneeded application components should be disabled or removed. By default, a virtual directory is installed for OMA, and the Exchange application default has OMA disabled. If an attacker were to intrude into an Exchange Front-End server and reactivate OMA, this attack vector could once again be open, provided the virtual directory were present. Once removed, the OMA functionality cannot be used without restoring the virtual directory, not a trivial process.
Check Content
Verify that OMA Virtual Directory is removed. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site Identify the OMA virtual directory in the list. Criteria: If the OMA virtual directory is deleted, this is not a finding.
Fix Text
Delete the OMA virtual directory. Procedure: IIS Manager >> [server name]>>Web Sites >> Default Web Site >>OMA Delete the OMA virtual directory.
Additional Identifiers
Rule ID: SV-20302r1_rule
Vulnerability ID: V-18681
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |