An attacker is able to provide a malicious AMD64 ELF binary that when opened by a victim may execute arbitrary code on the affected host.