FireEye Malware Input Processor Privilege Escalation

The mip user is already quite privileged, capable of accessing sensitive network data. However, as the child process has supplementary gid contents, there is a very simple privilege escalation to root.

Leave a Reply