bctool in Jetico BestCrypt 0.7 and earlier trusts the user-supplied PATH to find and execute an fsck utility program, which allows local users to gain privileges by modifying the PATH to point to a Trojan horse program.Referenceshttp://archives.neohapsis.com/archives/bugtraq/2001-06/0005.htmlhttp://www.securityfocus.com/bid/2820https://exchange.xforce.ibmcloud.com/vulnerabilities/6648http://www.jetico.com/index.htm#/linux.htm