The attacker doesn't need access to the computer; he just needs to convince the (super)user to mount his CD. I suspect if you can gain root access, you can run a trojan as root from that CD.
Mounting a CD image, at least, should be something that a user can do. It's the easiest way to handle them.
Copyright © 2018, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds