summaryrefslogtreecommitdiffstats
path: root/demux
diff options
context:
space:
mode:
authorJames Ross-Gowan <rossymiles@gmail.com>2016-03-25 21:06:30 +1100
committerJames Ross-Gowan <rossymiles@gmail.com>2016-03-25 21:06:30 +1100
commitef625a78a4784318b72cd44e9703591811e942fc (patch)
tree9488d5bd1e4c2fff41d629fc00f11e294e4a1fd7 /demux
parenta76f3e8e468b6962e57fd7dd4c5f487301ea001b (diff)
downloadmpv-ef625a78a4784318b72cd44e9703591811e942fc.tar.bz2
mpv-ef625a78a4784318b72cd44e9703591811e942fc.tar.xz
ipc-win: restrict read access to the IPC pipe
The default security descriptor for named pipes in Windows allows the pipe to be opened for read access by the Everyone group and Anonymous account, as well as low-integrity processes (like web browser renderer processes.) This does not allow commands to be ran, but it does allow events to be received. I don't think any sensitive data is exposed by events, but that may not always be the case and Lua plugins might change this, since they can broadcast their own events with script-message. To be safe, this commit sets a custom security descriptor on the named pipe which only allows access from processes running under the same user account with an integrity level greater than or equal to the one used by mpv.
Diffstat (limited to 'demux')
0 files changed, 0 insertions, 0 deletions