This article was previously published under Q269523
This article has been archived. It is offered "as is" and will no longer be updated.
It may be possible for a non-privileged user to elevate their existing security context to that of a service that was started by Service Control Manager (SCM). A malicious user could use a named pipe connection to instruct a Windows 2000-based computer to start a pre-defined process that has a security permission higher than the actual security permission that is assigned to the user.
To resolve this problem, obtain the latest service pack for Windows 2000. For additional information, click the following article number to view the article in theMicrosoft Knowledge Base:
260910 How to Obtain the Latest Windows 2000 Service Pack
The following files are available for download from the MicrosoftDownload Center:
For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to Obtain Microsoft Support Files from Online Services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file.The English version of this fix should have the following file attributes or later:
Date Time Size File name -------------------------------------------------- 07/25/00 06:18p 707,344 Kernel32.dll 07/25/00 06:17p 85,776 Services.exe
Microsoft has confirmed that this is a problem in Microsoft Windows 2000. This problem was first corrected in Windows 2000 Service Pack 2.
For additional information about how to install Windows 2000 and Windows 2000 hotfixes at the same time, click the article number below to view the article in the Microsoft Knowledge Base:
249149 Installing Microsoft Windows 2000 and Windows 2000 Hotfixes
For related information about this problem, please visit the following Microsoft Web site: