Code execution, privilege escalation, protection bypass, information spoofing.
vulners.com/securityvulns/securityvulns:doc:29215