Once in the new folder, Windows 10 changes the file's
security descriptor to match the security settings of the current folder.
Getting administrator privileges through the vulnerability starts with the way a «hard - linked» file receives
a security descriptor and is moved to a new destination.
The flaw in question relates to the SvcMoveFileInheritSecurity remote procedure call (RPC), which if exploited, can lead to an arbitrary file being assigned an arbitrary
security descriptor, that can potentially lead to elevation of privilege.
The security researcher who discovered this flaw has also attached a proof - of - concept code in C++ which creates a text file in the Windows folder, and abuses the SvcMoveFileInheritSecurity RPC to overwrite
the security descriptor to allow access to everyone.
Not exact matches
Assessment Best Practices Guide Performance Level
Descriptors Test
Security Quality Assurance Checklist Communication Device Policy example Communication Device Policy (editable)
It should consist of a
descriptor or job title like, «Information
security specialist who...» «It doesn't matter if this is a job title you have or ever did,» says Lees.