Description
SepAccessCheckEx doesn't properly validate the access rights. It has a hack to allow access, even though it could not get all rights.
        DPRINT("HACK: RemainingAccess = 0x%08lx  DesiredAccess = 0x%08lx\n", RemainingAccess, DesiredAccess);
I demoted it to a DPRINT, since it's massively spamming the log. This needs to be fixed!
Attachments
Issue Links
- blocks
- 
                    CORE-14520 CheckTokenMembership returns wrong result when checking local admin against SECURITY_LOCAL_SYSTEM_RID -         
- Resolved
 
-         
- is blocked by
- 
                    CORE-18620 'SepAccessCheck(): Failed to grant access rights' + "Traverse access failed!", at end of Stage 3 -         
- Resolved
 
-         
- 
                    CORE-18521 TaskMgr triggers 2 'SepAccessCheck(): Failed to grant access rights' + 'NtOpenProcessToken failed', each time it updates -         
- Resolved
 
-         
- relates to
- 
                    CORE-20052 0.4.15 Regression - Critical: "SaveDefaultUserHive() failed Rebooting now" for non-Latin in Release Mode -         
- Open
 
-         
- 
                    CORE-9172 Major debug log spam with "HACK: RemainingAccess = XXXXXXXX DesiredAccess = XXXXXXXX" messages -         
- Resolved
 
-         
