UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Navigation to URL's embedded in Office products must be blocked.


Overview

Finding ID Version Rule ID IA Controls Severity
V-17183 DTOO123 - Word SV-33415r1_rule ECSC-1 Medium
Description
To protect users from attacks, Internet Explorer usually does not attempt to load malformed URLs. This functionality can be controlled separately for instances of Internet Explorer spawned by Office applications (for example, if a user clicks a link in an Office document or selects a menu option that loads a Web page). If Internet Explorer attempts to load a malformed URL, a security risk could occur in some cases.
STIG Date
Microsoft Word 2010 2012-10-02

Details

Check Text ( C-33898r1_chk )
The policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Navigate URL” must be “Enabled” and a check in the ‘winword.exe’ check box must be present.

Procedure: Use the Windows Registry Editor to navigate to the following key:

HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL

Criteria: If the value winword.exe is REG_DWORD = 1, this is not a finding.
Fix Text (F-29587r1_fix)
Set the policy value for Computer Configuration -> Administrative Templates -> Microsoft Office 2010 (Machine) -> Security Settings -> IE Security “Navigate URL” to “Enabled” and place a check in the ‘winword.exe’ check box.