Microsoft Security Advisory: Elevation of privilege using Windows service isolation bypass

Support for Windows XP has ended

Microsoft ended support for Windows XP on April 8, 2014. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.

Support for Windows Server 2003 ended on July 14, 2015

Microsoft ended support for Windows Server 2003 on July 14, 2015. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.

Support for Windows Vista Service Pack 1 (SP1) ends on July 12, 2011. To continue receiving security updates for Windows, make sure you're running Windows Vista with Service Pack 2 (SP2). For more information, refer to this Microsoft web page: Support is ending for some versions of Windows.
Microsoft has released a Microsoft security advisory about this issue for IT professionals. The security advisory contains additional security-related information. To view the security advisory, visit the following Microsoft Web site:
The Windows Service Isolation feature that is described in this advisory does not correct a security vulnerability. Instead, it is a defense-in-depth feature that may be useful for some customers. For example, service isolation enables access to specific objects without the need to run a high-privilege account or weaken the security protection of the object. By using an access control entry that contains a service SID, a SQL Server service can restrict access to its resources.

To manually configure the Worker Process Identity (WPI) for application pools in IIS, follow these steps.

For IIS 6.0
  1. In IIS Manager, expand the local computer, expand Application Pools, right-click the application pool, and then select Properties.
  2. Click the Identity tab, and then click Configurable. In the User name and Password text boxes, type the user name and password of the account under which you want the worker process to operate.
  3. Add the selected user account to the IIS_WPG group.
For IIS 7.0 and later versions
  1. At an elevated command prompt, open the following folder:

    For more information about how to run a command with elevated privileges, visit the following Microsoft Web page:
  2. Type the APPCMD.exe commands, and press ENTER after each command:
    appcmd set config /section:applicationPools /
    [name='string'].processModel.identityType:SpecificUser /
    [name='string'].processModel.userName:string /
    Note You must adjust the syntax in the commands, depending on the following:
    • string is the name of the application pool
    • userName is the user name of the account that is assigned to the application pool
    • password is the password for the account
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service DoS TSE WinNT Win2000

Article ID: 2264072 - Last Review: 06/10/2011 16:33:00 - Revision: 1.2

Windows 7 Enterprise, Windows 7 Home Basic, Windows 7 Home Premium, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 R2 Standard, Windows Server 2008 R2 Enterprise, Windows Server 2008 R2 Datacenter, Windows Server 2008 Service Pack 2, Windows Server 2008 for Itanium-Based Systems, Windows Server 2008 Datacenter, Windows Server 2008 Enterprise, Windows Server 2008 Standard, Windows Web Server 2008, Windows Vista Service Pack 2, Windows Vista Service Pack 1, Microsoft Windows Server 2003 Service Pack 2, Microsoft Windows XP Service Pack 3

  • kbexpertiseinter kbinfo kbsecadvisory kbsecurity kbsecvulnerability KB2264072