Content deleted Content added
→Examples: examples need sources |
m Remove comma |
||
Line 80:
|}
In this example, an attacker can exploit the race condition between the <code>access</code> and <code>open</code> to trick the <code>setuid</code> victim into overwriting an entry in the system password database. TOCTOU races can be used for [[privilege escalation]]
Although this sequence of events requires precise timing, it is possible for an attacker to arrange such conditions without too much difficulty.
|