Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Microsoft Security Advisory: Elevation of privilege using Windows service isolation bypass


Support for Windows Vista Service Pack 1 (SP1) ends on July 12, 2011. To continue receiving security updates for Windows, make sure you're running Windows Vista with Service Pack 2 (SP2). For more information, refer to this Microsoft web page: Support is ending for some versions of Windows.

↑ Back to the top


INTRODUCTION

Microsoft has released a Microsoft security advisory about this issue for IT professionals. The security advisory contains additional security-related information. To view the security advisory, visit the following Microsoft Web site:

↑ Back to the top


More Information

The Windows Service Isolation feature that is described in this advisory does not correct a security vulnerability. Instead, it is a defense-in-depth feature that may be useful for some customers. For example, service isolation enables access to specific objects without the need to run a high-privilege account or weaken the security protection of the object. By using an access control entry that contains a service SID, a SQL Server service can restrict access to its resources.



To manually configure the Worker Process Identity (WPI) for application pools in IIS, follow these steps.

For IIS 6.0
  1. In IIS Manager, expand the local computer, expand Application Pools, right-click the application pool, and then select Properties.
  2. Click the Identity tab, and then click Configurable. In the User name and Password text boxes, type the user name and password of the account under which you want the worker process to operate.
  3. Add the selected user account to the IIS_WPG group.
For IIS 7.0 and later versions
  1. At an elevated command prompt, open the following folder:

    %systemroot%\system32\inetsrv

    For more information about how to run a command with elevated privileges, visit the following Microsoft Web page:



  2. Type the APPCMD.exe commands, and press ENTER after each command:


    appcmd set config /section:applicationPools /
    [name='string'].processModel.identityType:SpecificUser /
    [name='string'].processModel.userName:string /
    [name='string'].processModel.password:string
    Note You must adjust the syntax in the commands, depending on the following:


    • string is the name of the application pool
    • userName is the user name of the account that is assigned to the application pool
    • password is the password for the account

↑ Back to the top


Keywords: kbsecreview, kbexpertiseinter, kbinfo, kbsecadvisory, kbsecurity, kbsecvulnerability, kblangall, kbmustloc, kbsurveynew, kb

↑ Back to the top

Article Info
Article ID : 2264072
Revision : 1
Created on : 1/7/2017
Published on : 6/10/2011
Exists online : False
Views : 92