Closed Bug 1403230 Opened 7 years ago Closed 7 years ago

Block WRusr.dll in child processes that use alternate desktop.

Categories

(Core :: Security: Process Sandboxing, enhancement, P1)

All
Windows
enhancement

Tracking

()

RESOLVED FIXED
mozilla58
Tracking Status
firefox58 --- fixed

People

(Reporter: bobowen, Assigned: bobowen)

References

Details

(Whiteboard: sb+)

Attachments

(1 file)

This is part of an initial fix to the issues found in bug 1400637. Those problems arise because of some interaction between using alternate desktop and some anti-virus. This bug is going to use the chromium sandbox DLL blocking mechanism to block WRusr.dll (from Webroot SecureAnywhere) in children using alternate desktop. We may have to add other DLLs, in which case we'll probably make the code more sophisticated.
Comment on attachment 8912300 [details] [diff] [review] Block WRusr.dll in child processes when using Alternate Desktop Review of attachment 8912300 [details] [diff] [review]: ----------------------------------------------------------------- ::: security/sandbox/win/src/sandboxbroker/sandboxBroker.cpp @@ +27,5 @@ > #include "sandbox/win/src/sandbox.h" > #include "sandbox/win/src/security_level.h" > #include "WinUtils.h" > > +#define WEBROOT_DLL L"WRusr.dll" lets add a comment here explaining this, and a note we plan to improve this as we add files to the list.
Attachment #8912300 - Flags: review?(jmathies) → review+
Pushed by bobowencode@gmail.com: https://hg.mozilla.org/integration/mozilla-inbound/rev/fa27d9bd71e6 Block WRusr.dll in child processes when using Alternate Desktop. r=jimm
Status: ASSIGNED → RESOLVED
Closed: 7 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla58
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: