Open Bug 1277597 Opened 8 years ago Updated 2 years ago

COM security hardening in sandboxed content

Categories

(Core :: Security: Process Sandboxing, defect, P3)

Unspecified
Windows
defect

Tracking

()

Tracking Status
firefox49 --- affected

People

(Reporter: bugzilla, Unassigned)

Details

We do not want sandboxed content to be able to instantiate COM objects. There are ACL rights pertaining to this stuff.

1) The sandbox should have deny access to that;
2) The COM runtime should probably not have access to the registry keys that are required to do such things;
3) Content is still calling CoCreateInstance for stuff, so we need to find those instances and remote them;
4) We still need COM to work for a11y and maybe a few other instances where we implement COM servers, though they don't call CoCreateInstance or anything.

Any COM activations that we need to remote should be attached as dependencies to this bug.
Whiteboard: sbwc2 → sbwc3
Assignee: aklotz → nobody
Keywords: meta
Summary: Investigate COM security in sandboxed content → [meta] COM security hardening in sandboxed content
Whiteboard: sbwc3
The meta keyword is there, the bug doesn't depend on other bugs and there is no activity for 12 months.
:jimm, maybe it's time to close this bug?
Flags: needinfo?(jmathies)
Flags: needinfo?(jmathies)
Keywords: meta
Priority: -- → P3
Summary: [meta] COM security hardening in sandboxed content → COM security hardening in sandboxed content
Severity: normal → S3
You need to log in before you can comment on or make changes to this bug.