Microsoft Security Advisory (2264072): Elevation of Privilege Using Windows Service Isolation Bypass


 
Thread Tools Search this Thread
Special Forums Windows & DOS: Issues & Discussions Security Advisories (RSS) - Microsoft Microsoft Security Advisory (2264072): Elevation of Privilege Using Windows Service Isolation Bypass
# 1  
Old 08-10-2010
Microsoft Security Advisory (2264072): Elevation of Privilege Using Windows Service Isolation Bypass

Revision Note: V1.0 (August 10, 2010): Advisory published. Advisory Summary:Microsoft is aware of the potential for attacks that leverage the Windows Service Isolation feature to gain elevation of privilege. This advisory discusses potential attack scenarios and provides suggested actions that can help to protect against this issue. This advisory also offers a non-security update for one of the potential attack scenarios through Windows Telephony Application Programming Interfaces (TAPI).

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
HYPER-V(4)						   BSD Kernel Interfaces Manual 						HYPER-V(4)

NAME
hv_netvsc -- Hyper-V Network Virtual Service Consumer SYNOPSIS
To compile this driver into the kernel, place the following lines in the system kernel configuration file: device hyperv DESCRIPTION
The hv_netvsc driver implements the virtual network device for FreeBSD guest partitions running on Hyper-V. FreeBSD guest partitions running on Hyper-V do not have direct access to network devices attached to the Hyper-V server. Although a FreeBSD guest can access network devices using Hyper-V's full emulation mode, the performance in this mode tends to be unsatisfactory. To counter the above issues, the hv_netvsc driver implements a network Virtual Service Consumer (VSC) that relays network requests from the guest partition to the network Virtual Service Provider (VSP) hosted in the root partition using the high performance data exchange infra- structure provided by hv_vmbus(4) driver. The VSP in the root partition then forwards the network related requests to the physical network card. SEE ALSO
hv_ata_pci_disengage(4), hv_storvsc(4), hv_utils(4), hv_vmbus(4) HISTORY
Support for hv_netvsc first appeared in FreeBSD 10.0. The driver was developed through a joint effort between Citrix Incorporated, Microsoft Corporation, and Network Appliance Incorporated. AUTHORS
FreeBSD support for hv_netvsc was first added by Microsoft BSD Integration Services Team <bsdic@microsoft.com>. BSD
September 10, 2013 BSD