1.12.0
This commit is contained in:
parent
e3b7ca8096
commit
33599a0c99
|
@ -13,6 +13,7 @@ This project adheres to [Semantic Versioning](http://semver.org/).
|
|||
- added "get_cert SBIEX-XXXXX-XXXXX-XXXXX-XXXXX" command to UpdUtil.exe allowing to get a cert by serial using command line
|
||||
- added mechanism to revoke leaked or refunded certificates
|
||||
- added mechanism to automatically set USB drives as forced folders
|
||||
- added troubleshooting script for issue [#3318](https://github.com/sandboxie-plus/Sandboxie/issues/3318) with parental controls
|
||||
|
||||
### Changed
|
||||
- improved suspend process ahndling [#3375](https://github.com/sandboxie-plus/Sandboxie/issues/3375)
|
||||
|
|
|
@ -0,0 +1,15 @@
|
|||
/*
|
||||
* group: other
|
||||
* class: sandboxing
|
||||
* name: SBIE2204: Cannot start a specific sandboxed service
|
||||
* description: Sandboxie failed to start a service in the sandbox
|
||||
*
|
||||
*/
|
||||
|
||||
if(msgData[0] == "DcomLaunch (346)")
|
||||
{
|
||||
invoke("SBIEFIXPC");
|
||||
try_fix_PC_SRP();
|
||||
}
|
||||
else
|
||||
wizard.showStatus(tr('The message indicates that Sandboxie was unable to start one of the helper programs SandboxieRpcSs or SandboxieDcomLaunch. The name noted in the message can be rpcss or dcomlaunch.\n\nYou can submit an issue report on the next page to help us to analyze the issue.'), true);
|
|
@ -0,0 +1,15 @@
|
|||
/*
|
||||
* group: other
|
||||
* class: sandboxing
|
||||
* name: SBIE2313 Could not execute specific process
|
||||
* description: Sandboxie failed to start a process in the sandbox
|
||||
*
|
||||
*/
|
||||
|
||||
if(msgData[0] == "SandboxieDcomLaunch.exe (346)")
|
||||
{
|
||||
invoke("SBIEFIXPC");
|
||||
try_fix_PC_SRP();
|
||||
}
|
||||
else
|
||||
wizard.showStatus(tr('Sandboxie was not able to execute one of its own programs. Check access permissions to the Sandboxie installation folder and/or reinstall Sandboxie.\n\nPossible Causes:\n1. Sandboxie was configured to block access to the folder containing its program files.\n2. A third-party (HIPS) security software was configured to block the execution of the program mentioned in the message.\n\nYou can submit an issue report on the next page to help us to analyze the issue.'), true);
|
|
@ -0,0 +1,35 @@
|
|||
/*
|
||||
* group: library
|
||||
* class: sandboxing
|
||||
* name: fix parental controls breaking sandboxie
|
||||
* description: stops AppId driver and AppIdSvc service and disables the offending policy file
|
||||
*
|
||||
*/
|
||||
|
||||
function try_fix_PC_SRP()
|
||||
{
|
||||
let form = [
|
||||
{id: 'stop', name: 'Stop AppIdSvc service and AppId driver (temporary fix)', type: 'radio'},
|
||||
{id: 'disable', name: 'Disable Parental Control Policy', type: 'radio'},
|
||||
{id: 'failed', name: 'The above mitigations did not work', type: 'radio'},
|
||||
];
|
||||
let obj = wizard.showForm(form, tr('It seams you are using a non administrative user account on a system with enabled parental controls, this is a known to be incomatible with sandboxie.\nYou have the following options to resolve the issue.'));
|
||||
|
||||
//_debugger();
|
||||
|
||||
if(obj.failed){
|
||||
wizard.setResult(false, 'Available mitigations failed');
|
||||
return;
|
||||
}
|
||||
|
||||
let command = '/c net stop AppIdSvc & net stop AppId';
|
||||
if(obj.disable)
|
||||
command += ' & move %systemroot%\\system32\\AppLocker\\Plugin.133422605925491691.Policy %systemroot%\\system32\\AppLocker\\Disabled__Plugin.133422605925491691.Policy__'
|
||||
|
||||
let ret = system.execute('cmd.exe', command, {elevate: true});
|
||||
|
||||
if(ret.error)
|
||||
wizard.setResult(false, 'Failed to execute recured command: ' + ret.error);
|
||||
else
|
||||
wizard.setResult(true);
|
||||
}
|
Loading…
Reference in New Issue