Bug 1123245 Part 2: Use the USER_NON_ADMIN access token level for Windows NPAPI processes. r=tabraldes, a=sledru
authorBob Owen <bobowencode@gmail.com>
Mon, 26 Jan 2015 11:44:27 +0000
changeset 243026 f7b5148c84a1
parent 243025 2ab5add95717
child 243027 9bfc57be3f2c
push id4366
push userbobowencode@gmail.com
push date2015-01-26 12:06 +0000
treeherdermozilla-beta@9bfc57be3f2c [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewerstabraldes, sledru
bugs1123245
milestone36.0
Bug 1123245 Part 2: Use the USER_NON_ADMIN access token level for Windows NPAPI processes. r=tabraldes, a=sledru
security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp
--- a/security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp
+++ b/security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp
@@ -108,17 +108,17 @@ SandboxBroker::SetSecurityLevelForPlugin
     return false;
   }
 
   auto result = mPolicy->SetJobLevel(sandbox::JOB_NONE,
                                      0 /* ui_exceptions */);
   bool ret = (sandbox::SBOX_ALL_OK == result);
 
   result = mPolicy->SetTokenLevel(sandbox::USER_RESTRICTED_SAME_ACCESS,
-                                  sandbox::USER_RESTRICTED_SAME_ACCESS);
+                                  sandbox::USER_NON_ADMIN);
   ret = ret && (sandbox::SBOX_ALL_OK == result);
 
   result = mPolicy->SetDelayedIntegrityLevel(sandbox::INTEGRITY_LEVEL_MEDIUM);
   ret = ret && (sandbox::SBOX_ALL_OK == result);
 
   // Add the policy for the client side of a pipe. It is just a file
   // in the \pipe\ namespace. We restrict it to pipes that start with
   // "chrome." so the sandboxed process cannot connect to system services.