[Arrow] By compiling a windows executable in a non-standard way, e.g. linking it to Linux libc6, which is trivial enough to do that some beginning programmers do it accidentally, the virus have full read access to linux paths, e.g. /etc and system() calls regardless of whether Z:\ drive exists. The damage will be limited to the access rights of the account that runs wine. They had better not be a member of the disk group... Root exploits are nothing new, but they never get old. http://blog.cr0.org/2009/07/old-school-local-root-vulnerability-in.html