The case of the thirty minute hack was where a remote user
allowed to log on through ssh was able to elevate his priveliges.

that's a serious issue if you are allowing remote users to have shell...