Solaris ISP Server 2.0 Administration Guide

Buffer Overrun Exploits

If a program does not check buffer limits when reading and receiving data, this opening can be exploited to add arbitrary data into a program or file system. When run, this data can give the intruder root access to your system.