Organization : Red Hat
Last Modified : 2007-04-19T00:00:00
These attacks are reliant on an insecure configuration of the server - that the user the server runs as has write access to the document root. The suexec security model is not intented to protect against privilege escalation in such a configuration