On 25 Feb 99, at 17:44, Moscoe, Corey wrote:
> Does anyone know what are the consequences/risks of having DCOM
> enabled in an Internet Firewall. I know that ISS identifies that as
> a vulnerability, but I do not truly understand how this vulnerability
> could be exploited or are there other controls that I could implement
> which would mitigate this risk. Unfortunately, I am not very
> technical so any laymen terms would be appreciated. Thank you.
DCOM is (Distributed) Component Object Model. Think of it as an
object-oriented cousin to RPC.
Like RPC, it can be useful for building networked applications.
Like RPC, it can be dangerous if an outsider knows your machine has a
common component installed whose functions include, say, delete file,
transmit file, modify configuration, or other useful/dangerous
operations.
I don't think theres anyone in the world who knows what every third-
party DCOM module installed on their PC is capable of.
David G
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]