Quote Originally Posted by ShadowBane View Post
Really, any of the remote root exploits listed here would allow the installation of bootloader viruses...
http://www.exploit-db.com/platform/?p=linux

Bootloader exploits are attractive because they are very hard to detect from a booted computer. There is no reason to expect that people using Linux would never be targeted by such attacks.
Sure nice database of non-working exploits(hint: outdated) , very valuable for studying.