Theoretical Support for Hypothesis
-
In many UNIX systems, the previous security context has full control over what can be executed in the new context. For example, a user wanting to execute ls(1) as root can do so by executing
su -c "ls"
-
All applications in the previous context run at same level of privilege. This means that they can be trojaned by any other exploited or infected application in that context