Description
SepAccessCheckEx doesn't properly validate the access rights. It has a hack to allow access, even though it could not get all rights.
DPRINT("HACK: RemainingAccess = 0x%08lx DesiredAccess = 0x%08lx\n", RemainingAccess, DesiredAccess);
I demoted it to a DPRINT, since it's massively spamming the log. This needs to be fixed!
Attachments
Issue Links
- blocks
-
CORE-14520 CheckTokenMembership returns wrong result when checking local admin against SECURITY_LOCAL_SYSTEM_RID
- Resolved
- is blocked by
-
CORE-18620 'SepAccessCheck(): Failed to grant access rights' + "Traverse access failed!", at end of Stage 3
- Resolved
-
CORE-18521 TaskMgr triggers 2 'SepAccessCheck(): Failed to grant access rights' + 'NtOpenProcessToken failed', each time it updates
- Resolved
- relates to
-
CORE-9172 Major debug log spam with "HACK: RemainingAccess = XXXXXXXX DesiredAccess = XXXXXXXX" messages
- Resolved