Rocks Clusters Local Privilege Escalation Vulnerabilities

Attackers can exploit these issues using a Linux command shell.

Sample exploit code has been provided:


 

Privacy Statement
Copyright 2010, SecurityFocus