Subscribe via feed.

FireEye Malware Input Processor Privilege Escalation

Posted by deepcore on March 26, 2016 – 7:51 am

The mip user is already quite privileged, capable of accessing sensitive network data. However, as the child process has supplementary gid contents, there is a very simple privilege escalation to root.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.