Red Hat OpenSSH Backdoor Vulnerability

OpenSSH running on Red Hat operating systems are prone to a backdoor vulnerability.

Attackers can exploit this issue by enticing an unsuspecting victim to download and install a malicious OpenSSH package from a compromised Red Hat software repository or from mirrors that replicated the malicious packages. Successfully exploiting this issue will compromise the affected computer.

This issue affects OpenSSH running on the following operating systems:

Red Hat Enterprise Linux 4 i386
Red Hat Enterprise Linux 4 x86_64
Red Hat Enterprise Linux 5 x86_64


 

Privacy Statement
Copyright 2010, SecurityFocus