Restrictions bypass if alternative data streams are allowed.
vulners.com/securityvulns/securityvulns:doc:30020