The identified vulnerability allows non-privileged users permission to change key program files. This condition presents a risk for shared, multi-user systems. On such systems, a hostile user could take advantage of this condition to replace these program files with malicious or harmful code that could read, write, or destroy sensitive data if subsequently run by