Remedy: |
All platforms should either disable sharing or review access controls.
Note: The vulnerability will be flagged if any shares are detected, even if they are not accessible. Windows 95 machines must disable file and print sharing to avoid flagging this vulnerability. If shares are needed and must be secure, consider upgrading to Windows NT running NTFS.
Windows 95: Select one of these choices:
- Remove file and print sharing.
- Open the Network control panel. From the Windows NT Start menu, select Settings, Control Panel, Network.
- From Configuration, click File and Print Sharing.
- Disable 'I want to be able to give others access to my files' and disable 'I want to be able to allow others to print to my printer(s).'
- Click OK and restart the computer. The Windows 95 machine no longer allows shares to exist or be created.
- Use user-level access control (does not eliminate vulnerability). To implement user-specific permissions in Windows 95:
If disabling Windows 95 sharing is unacceptable, you can use user-level access control. This approach does not eliminate reporting for a vulnerability, but it does decrease the risk. Windows 95 permits user-specific permissions if it is part of a domain. Access to the share by password is discouraged because of the possibility of unlimited and unlogged brute force attacks.
To implement user-specific permissions, follow these steps:
- Open the Network control panel. From the Windows NT Start menu, select Settings, Control Panel, Network.
- From the Access Control tab, select User-Level access control.
- Type the domain name.
- Click OK.
Windows NT: Select one of these options:
- Grant share access only to approved users.
- From the local computer, open Windows NT Explorer.
- Navigate to the shared folder.
- Right-click the shared folder name and select Sharing to display the Properties dialog box.
- Click Permissions.
- Use these guidelines to review the listed permissions:
- Remove or change any permissions such as Everyone: Full Control. This default permission allows all users to read, modify, and even change ownership and permissions on the items in the share.
- Review any names with Change or Full Control permissions and determine if the permission is appropriate. Consider using Read Only or No Access if these names do not need to modify items in the share.
- Review any names that should not be in the list, and remove the name or change their permission as appropriate.
- To remove a share, choose one of these options:
|