Attack of the killer CD
Posted Mar 25, 2005 0:36 UTC (Fri) by dvdeug
Parent article: Attack of the killer CD
The attacker doesn't need access to the computer; he just needs to convince the (super)user to mount his CD. I suspect if you can gain root access, you can run a trojan as root from that CD.
Mounting a CD image, at least, should be something that a user can do. It's the easiest way to handle them.
to post comments)