Linux Init Default Umask Vulnerability

There is no real exploit required to exploit this vulnerability as exploitation varies. Identify and modify a target file that has been created insecurely by an initialization script.


 

Privacy Statement
Copyright 2010, SecurityFocus