Step 1: User Login: An attacker gains local access to the vulnerable ULTRIX system, either through a legitimate account or by exploiting another vulnerability.
Step 2: Exploitation Trigger: The attacker crafts a malicious input, typically through environment variables or command-line arguments passed to the mail utility. This input is designed to trigger the vulnerability.
Step 3: Code Injection: The crafted input overwrites critical memory locations or injects malicious code into the program's execution flow.
Step 4: Privilege Escalation: The injected code executes with the privileges of the mail utility, which often runs with elevated permissions (e.g., root). This allows the attacker to execute arbitrary commands with those privileges.
Step 5: System Compromise: The attacker uses the elevated privileges to gain control of the system, potentially installing backdoors, stealing data, or disrupting services.