Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It looks like the exploit path calls system() on attacker supplied input, if the check passes. I don't think we need to go into more detail than "it does whatever the attacker wants to on your computer, as root".


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: