All of the 17 vulnerabilities being addressed can be remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password."
Link to Original Source
Catch up on stories from the past week (and beyond) at the Slashdot story archive
"Lead us in a few words of silent prayer." -- Bill Peterson, former Houston Oiler football coach