be exploited to gain the privileges of the target user. http://www.idefense.com/advisory/12.23.02.txt