source: wwwsecurityfocuscom/bid/780/info
Seyon uses relative pathnames to spawn two other programs which it requires It is possible to exploit this vulnerability to obtain the priviliges which seyon runs with It is installed (by default) setgid dialer on FreeBSD and root on Irix
bash-203$ uname -a; id; ls -la `which seyon`
FreeBSD 3 ...