Windows Service Isolation & Clipboard Flaws

Microsoft has issued a new security advisory on Tuesday concerning a Windows Service Isolation feature that could enable elevation-of-privilege exploits.  This vulnerability affects Windows XP, Vista and 7, as well as Server 2003 and Server 2008.  Microsoft says that an attacker could use this feature to elevate processes running on a Windows-based “NetworkService account” to the “LocalSystem account” on a server, giving the attacker the ability to take control of a system.

At-risk Microsoft products include the Windows telephony application programming interfaces, SQL Server and Internet Information Services (IIS) in Windows Server 2003 and 2008.  Because there is only a limited likelihood of such attacks at this time, Microsoft did not specify whether the issue would warrant further actions, such as the issuance of workarounds or patches.  In this Knowledge Base article, the Microsoft describes various access control tools in both IIS and SQL that can restrict entry to the NetworkService account.

No Security Advisory for Clipboard Issue
On Wednesday, Microsoft provided an updated statement on the zero-day Windows kernel-level clipboard vulnerability uncovered last week.  Microsoft said it will not release a security advisory for the heap overflow problem affecting all supported Windows versions.  For this vulnerability to be exploited “an attacker must have valid log-on credentials on the target system and be able to log on locally, or must already have code running on the target system.”

I sure hope they are right on both counts…


One thought on “Windows Service Isolation & Clipboard Flaws

  1. Pingback: Windows Service Isolation & Clipboard Flaws — National Cyber Security National Cyber Security

Comments are closed.