MSDN says:
Allows a user to modify a process's security access token. This is a
powerful right used only by the system.
How this privilege can be used to break system security? Why it
should not be granted to normal users?
Thank you in advance.
--
Alex Fedotov,
3Cube, Inc.
www.3cube.com
> How this privilege can be used to break system security?
> Why it should not be granted to normal users?
I didn't try this, but the first thing that comes to mind is building
(or grabbing) a token with higher privileges or a more convenient group
list and replacing the current process token with it.
--
Cheers,
Felix.
If you post a reply, kindly refrain from emailing it, too.
Note to spammers: fel...@mvps.org is my real email address.
No anti-spam address here. Just one comment: IN YOUR FACE!
Thanks for the answer.
> > How this privilege can be used to break system security?
> > Why it should not be granted to normal users?
>
> I didn't try this, but the first thing that comes to mind is building
> (or grabbing) a token with higher privileges or a more convenient group
> list and replacing the current process token with it.
But it won't be easy to get a token with higher privileges. Even if we
got it, we still need TOKEN_ASSIGN_PRIMARY access permission in
order to use the that way.
My question is not why this privilege exists (My answer: it controls
which accounts are allowed to create processes as different users),
but why it is called powerful.
Once I have a token, why creating a process with this token is considered
a powerful action? In fact, I can use the token for impersonation without
any additional privileges. I know that several access checks are always
performed against the primary process token (some related to window
stations and desktops), but are they so important?
Or, maybe, assigning process token directly I can bypass audit that
otherwise will be generated?
Just trying to understand :)
> Just trying to understand :)
Me, too. :) Let's wait for Prabagar to stop by.
Dave
-----Original Message-----
Alex,
--
Cheers,
Felix.
.
good to see you are still alive! I appreciate the explanation.
Thanks,
Prabagar
"Felix Kasza [MVP]" <fel...@mvps.org> wrote in message
news:3afd03ee...@msnews.microsoft.com...