Super is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffer.
Successfully exploiting this issue allows an attacker to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Vendor Status:
Currently we are not aware of any vendor-supplied patches.