Thats probably not a good idea... You could end up with a situation like this: http://www.idefense.com/intelligence/vulnerabilities/display.php?id=324
-KF

3.      Running the JVM setuid root.


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to