Bug 1123245 Part 2: Use the USER_NON_ADMIN access token level for Windows NPAPI processes. r=tabraldes, a=sledru
authorBob Owen <bobowencode@gmail.com>
Mon, 26 Jan 2015 08:00:40 +0000
changeset 249401 f79836f9957ea6066370fedc8601c17ed916b81f
parent 249400 20dbbb1fd98a238e51b7ea4e0400914867e0a50b
child 249402 171f05f3d01c75de35dbf4c7b5741dfaacde3a64
push id4489
push userraliiev@mozilla.com
push dateMon, 23 Feb 2015 15:17:55 +0000
treeherdermozilla-beta@fd7c3dc24146 [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewerstabraldes, sledru
bugs1123245
milestone37.0a2
Bug 1123245 Part 2: Use the USER_NON_ADMIN access token level for Windows NPAPI processes. r=tabraldes, a=sledru
security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp
--- a/security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp
+++ b/security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp
@@ -123,17 +123,17 @@ SandboxBroker::SetSecurityLevelForPlugin
     return false;
   }
 
   auto result = mPolicy->SetJobLevel(sandbox::JOB_NONE,
                                      0 /* ui_exceptions */);
   bool ret = (sandbox::SBOX_ALL_OK == result);
 
   result = mPolicy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS,
-                                  sandbox::USER_RESTRICTED_SAME_ACCESS);
+                                  sandbox::USER_NON_ADMIN);
   ret = ret && (sandbox::SBOX_ALL_OK == result);
 
   result = mPolicy->SetDelayedIntegrityLevel(sandbox::INTEGRITY_LEVEL_MEDIUM);
   ret = ret && (sandbox::SBOX_ALL_OK == result);
 
   // Add the policy for the client side of a pipe. It is just a file
   // in the \pipe\ namespace. We restrict it to pipes that start with
   // "chrome." so the sandboxed process cannot connect to system services.