Many applications and programs create temporary files, or temp files, when they are run. If a program runs as root and does not take care about where its temporary files are put and what permissions the temporary files have (known as “poor temp files”), using links for creating root-owned files becomes a real possibility—a problem that creates opportunities for crackers.
See Also: Root.
NMRC. The Hack FAQ. Unix Local Attacks. [Online, 2004.] NMRC Website. http://www.nmrc.org/pub/faq/hackfaq/hackfaq-29.html.