FireEye Malware Input Processor Privilege Escalation
Posted by deepcore on March 26, 2016 – 7:51 am
The mip user is already quite privileged, capable of accessing sensitive network data. However, as the child process has supplementary gid contents, there is a very simple privilege escalation to root.
Post a reply
You must be logged in to post a comment.