D
DevilsPGD
In message <[email protected]> "Joseph Geretz"
How would you suggest doing that?
The problem is that the security token needs to be assigned at runtime,
an app cannot be elevated while running. This is required, otherwise a
non-elevated app could hook into an app which it suspects might become
elevated in the future, and once the elevation happens, the non-elevated
app would have full elevated privileges.
Worse, consider what would happen to a regular user (non-administrator)
who happened to be running a program that needed to be elevated part way
through. The program would not only received an administrator token,
but also an entirely different security context -- The new context might
not even have the ability to read it's own EXE, or the files it was
reading previous to the elevation.
Yes, as I suggested:
But that's too tricky?
How would you suggest doing that?
The problem is that the security token needs to be assigned at runtime,
an app cannot be elevated while running. This is required, otherwise a
non-elevated app could hook into an app which it suspects might become
elevated in the future, and once the elevation happens, the non-elevated
app would have full elevated privileges.
Worse, consider what would happen to a regular user (non-administrator)
who happened to be running a program that needed to be elevated part way
through. The program would not only received an administrator token,
but also an entirely different security context -- The new context might
not even have the ability to read it's own EXE, or the files it was
reading previous to the elevation.