Check: DTOO128 - Outlook
Microsoft Outlook 2010 STIG:
DTOO128 - Outlook
(in versions v1 r13 through v1 r12)
Title
Data Execution Prevention must be enforced. (Cat II impact)
Discussion
Data Execution Prevention (DEP) is a set of hardware and software technologies performing additional checks on memory to help prevent malicious code from running on a system. The primary benefit of DEP is to help prevent code execution from data pages. Enabling this setting, turns off Data Execution Prevention. As a result, malicious code takes advantage of code injection or buffer overflow vulnerabilities possibly exploiting the computer.
Check Content
The policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Trust Center “Turn off Data Execution Prevention” must be set to “Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\14.0\outlook\security Criteria: If the value EnableDEP is REG_DWORD = 1, this is not a finding.
Fix Text
Set the policy value for User Configuration -> Administrative Templates -> Microsoft Outlook 2010 -> Security -> Trust Center “Turn off Data Execution Prevention” to “Disabled".
Additional Identifiers
Rule ID: SV-33857r1_rule
Vulnerability ID: V-26590
Group Title: DTOO128 - Data Execution Prevention
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001170 |
The information system prevents the automatic execution of mobile code in organization-defined software applications. |
Controls
Number | Title |
---|---|
SC-18 (4) |
Prevent Automatic Execution |