New Security Bugs : MS says behavior was as intended

Victor M

Level 9
Thread author
Verified
Well-known
Oct 3, 2022
411
Gets SYSTEM privilege ! No fixes in Sight.
 
F

ForgottenSeer 97327

Off topic Question to native English speaking members

Funny the article mentions RPC call. RPC stand for Remote Procedure Call. So RPC call is sort of redundant.

I am not native English but have often struggled a bit with abbreviations, like the author used here. I know it is custom to first use the the full name with abbreviation after it "He looked for Remote Procedural Call (RPC) servers running" so further in your piece of text you can refere to the abbreviation. My struggle is that sometimes using the abbreviation solely, the sentence might be unclear to the readers who are no insiders. The author uses the abbreviation RPC but adds the text "calls" to the abbreviation so the sentence is better readable "RPC calls to Spooler" (although redundant because it reads as 'Remote Procedure Call calls').

Is this okay to do? I am writing a piece of content for a mixed audience (iboth insiders and outsiders) and had also taken the liberty of above redundancy to increase readability. But our translator who checked my English text had removed them all. What is the opinion of native English speakers on this?
 
Last edited by a moderator:
F

ForgottenSeer 97327

To return to the topic: It seems a very "useable" way of getting access by simply starting this chain of events with the "RpcOpenPrinter" call *which iswhat it says no big thing just opening a printer somewhere in the network for access". Question to more knowledgeable readers: It is quite scaring to obtain such a seemingly simple priveledge escalation. Microsoft responding with "works as designed and intended" seems to dismiss its severity. So what is the catch, do you need to have elevated rights already to abuse this privilege escalation?
 
  • Like
Reactions: plat and Nevi

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,189
If I correctly understood the article it is about privilege escalation from high to system privileges. Although some of the reported techniques can be new, they follow from the design of Windows. The user with high privileges can do anything (including privilege escalation)*. There are many known and yet unknown techniques to do it. In many cases, Microsoft cannot prevent this, except for adding some behavior-based rules to Defender. Some techniques can be probably prevented in the future by adding/extending Windows built-in security layers.

The Microsoft reaction would be different if the technique could allow a privilege escalation from standard privileges.

Edit.
* - anything at the User-level and many things at the Kernel-level.
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top