---------------------------------------------------------------------- Get tweets from Secunia http://twitter.com/secunia ---------------------------------------------------------------------- TITLE: Microsoft Windows Service Isolation Bypass Security Issue SECUNIA ADVISORY ID: SA40825 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40825/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40825 RELEASE DATE: 2010-08-11 DISCUSS ADVISORY: http://secunia.com/advisories/40825/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/40825/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=40825 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A security issue has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges. The security issue is caused due to an error in the Windows Service Isolation feature, which can be exploited by a process with NetworkService privileges to gain LocalSystem privileges. Successful exploitation requires e.g. that an attacker can control web content hosted on an IIS server or has SQL Server administrative privileges. SOLUTION: Do not run critical services with NetworkService privileges and apply the non-security update (please see the vendor advisories for details). Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ PROVIDED AND/OR DISCOVERED BY: Cesar Cerrudo, Argeniss. ORIGINAL ADVISORY: Microsoft: http://www.microsoft.com/technet/security/advisory/2264072.mspx http://support.microsoft.com/kb/982316 http://support.microsoft.com/kb/2264072 Argeniss: http://argeniss.com/research/TokenKidnappingRevengePaper.pdf OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------