On 09/25/2014 08:31 AM, John Shaver wrote:
> On Thu, Sep 25, 2014 at 8:23 AM, Michael Torrie <[email protected]> wrote:
>> I've run a few tests
>> and I'm unable to get the exploit to work remotely unless I get the
>> login to succeed.  Obviously I'm missing something.  Can someone help me
>> out here?
> 
> I think that's the way it works.  I think the attacker has to have a
> login point (their's or one they 'acquired' from someone else), but
> then they can gain elevated privileges.

Good to know. Thank you!

/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/

Reply via email to