Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-68849 | WN10-00-000150 | SV-83445r3_rule | High |
Description |
---|
Attackers are constantly looking for vulnerabilities in systems and applications. Structured Exception Handling Overwrite Protection (SEHOP) blocks exploits that use the Structured Exception Handling overwrite technique, a common buffer overflow attack. |
STIG | Date |
---|---|
Windows 10 Security Technical Implementation Guide | 2018-04-06 |
Check Text ( C-77573r2_chk ) |
---|
This is applicable to Windows 10 prior to v1709. Verify SEHOP is turned on. If the following registry value does not exist or is not configured as specified, this is a finding. If SEHOP is configured through the Enhanced Mitigation Experience Toolkit (EMET), this registry setting is NA. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Control\Session Manager\kernel\ Value Name: DisableExceptionChainValidation Value Type: REG_DWORD Value: 0x00000000 (0) If EMET is still installed and SEHOP is configured through it, verify the following registry value. If it does not exist or is not configured as specified, this is a finding. Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SOFTWARE\Policies\Microsoft\EMET\SysSettings\ Value Name: SEHOP Value Type: REG_DWORD Value: 2 |
Fix Text (F-84659r2_fix) |
---|
Configure the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> "Enable Structured Exception Handling Overwrite Protection (SEHOP)" to "Enabled". This policy setting requires the installation of the SecGuide custom templates included with the STIG package. "SecGuide.admx" and "SecGuide.adml" must be copied to the \Windows\PolicyDefinitions and \Windows\PolicyDefinitions\en-US directories respectively. If EMET is still installed, SEHOP is configured with the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> EMET >> "System SEHOP" to "Enabled" with "Application Opt Out" selected. |