Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Depending on the code, this could lead to any number of attacks, many of which could give root access. For an overview of some software vulnerabilities, see Zalewski's signal article. VU #834865 is also an example of this.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

MSCxx-C

3 (high)

3 (likely)

1 (high)

P9

L2

...