Confirmed users
717
edits
Line 13: | Line 13: | ||
====Threats==== | ====Threats==== | ||
*code execution in a privileged process (inc. a library it loads) could result in direct system compromise | *code execution in a privileged process (inc. a library it loads) could result in direct system compromise | ||
*isolated process could trick a privileged process to perform an attack on its behalf (write a file to an arbitrary location on disk, write a registry entry, launch a process, open a socket, etc) | *isolated process could trick a privileged process to perform an attack on its behalf (write a file to an arbitrary location on disk, write a registry entry, launch a process, open a socket, etc) - beware proxy APIs in brokers/elevated privilege processes | ||
*flaws in system services could be exploited from an isolated process | *flaws in system services could be exploited from an isolated process | ||
*malicious or flawed full-privilege add-ons or plugins | *malicious or flawed full-privilege add-ons or plugins |