I will only add that even in the best of circumstances with perfect firewalling, a low privilege sysadmin or helpdesk member/troubleshooter could easily use this overflow as a hop to privilege escalation and/or willful damage.
I will only add that even in the best of circumstances with perfect firewalling, a low privilege sysadmin or helpdesk member/ troubleshooter could easily use this overflow as a hop to privilege escalation and/or willful damage.