The ThreadPool class in Windows Vista Gold and SP1, and Server 2008, does not properly implement isolation among a set of distinct processes that (1) all run under the NetworkService account or (2) all run under the LocalService account, which allows local users to gain privileges by leveraging incorrect thread ACLs to access the resources of one of the processes, aka "Windows Thread Pool ACL Weakness Vulnerability."
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
http://www.securitytracker.com/id?1022044 | third party advisory vdb entry |
http://www.us-cert.gov/cas/techalerts/TA09-104A.html | third party advisory us government resource |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-012 | patch vendor advisory |
http://www.vupen.com/english/advisories/2009/1026 | vdb entry permissions required |
http://osvdb.org/53668 | vdb entry broken link |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6177 | signature third party advisory vdb entry |