Is it possible, for a user who already has an account in a linux box, to become root by compiling and starting a program known to be vulnerable?

If yes, how to discover this user?
Is there a way to block such exploits or not?

Thank you

Olaf

<olaf@ kjws.com> for every kind of mail, except spam! :-)


Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com


Reply via email to