The flaw allows a remote attacker to execute code on a vulnerable machine with the privileges of the local user.
The vulnerability affects machines running Unix, AIX, Linux, Solaris or HP/UX; Windows and Macintosh machines are unaffected.
>>> Подробности