If a program does not check buffer limits when reading and receiving data, this opening can be exploited to add arbitrary data into a program or file system. When run, this data can give the intruder root access to your system.