The vulnerability is related to the way DCs handle the task of managing the Schema and Configuration partitions. Exploitation of this vulnerability will result in attackers being able to manipulate the Schema and Configuration partitions on other DCs. This has the potential to cause serious network problems for an existing Windows domain. Malicious administrators, through the use of weak permissions, are able to execute certain services under the SYSTEM context to manipulate the contents of the Schema and Configuration partitions.
The vulnerability is related to the way DCs handle the task of managing the Schema and Configuration partitions. Exploitation of this vulnerability will result in attackers being able to manipulate the Schema and Configuration partitions on other DCs. This has the potential to cause serious network problems for an existing Windows domain. Malicious administrators, through the use of weak permissions, are able to execute certain services under the SYSTEM context to manipulate the contents of the Schema and Configuration partitions.