This exploit uses a symbolic link vulnerability in the Borland Interbase gds_lock_mgr binary to overwrite /etc/xinetd.d/xinetdbd with code that spawns a root shell on port 666 TCP.
d7d156c479c021809f9a0057514db6f1459ab7f03ab76f348bc1c94b1dfed0a8
© 2022 Packet Storm. All rights reserved.