Thanks for sharing this. Here's a link about it I found for anyone who wants it:
http://www.h-online.com/open/news/it...d-1614990.html
Am I correct in thinking that if one has their server configured to only accept local connections (like 127.0.0.1 for instance) then the hacker would have to first get a shell account or such on the system to be able to actually exploit this?