I could verify your realvnc issue.
You can configure RealVNC by running "surun C:\Programme\RealVNC\VNC4\vncconfig.exe -noconsole -service".
Koharubi:1248639691 wrote:
Limited rights for service-spawned processes will (sometimes) be unexpected and/or undesired behavior. Do you agree?
SuRun can hardly prevent a usual service from spawning processes with limited rights.
SuRuns hooks affect GUI apps only.
In the case of RealVNC we're in luck, but with non GUI services not.
Koharubi:1248639691 wrote:
If so, would it be possible in future versions to allow elevation of service-spawned processes? You make it sound dangerous, so perhaps you can implement a whitelist of parent service processes that would be monitored, and all others would be ignored. And of course you would not need to elevate anything running as NT AUTHORITY\*.
SuRun would have to intercept the CreateProcessAsUser function.
Then analyze the user token.
If it is the logged on limited user but the program is in the users list SuRun would ask/start the program with an elevated token... This could also solve the "new hardware wizard" problem...
A quick check in a VMware WinXPproSP3 shows SuRunExt.dll injected to all service processes.
Your suggestion might work. :-D
I'll put that on the wish list.