View Single Post
  #2   (View Single Post)  
Old 26th January 2013
comet--berkeley comet--berkeley is offline
Real Name: Richard
Package Pilot
 
Join Date: Apr 2009
Location: California
Posts: 163
Default

The article does not describe a vulnerability particular to Linux.

Quote:
...it is hard to tell how this Trojanized SSH daemon made its way on a compromised server...
Any system with an sshd server is "vulnerable" if the sshd server can be replaced by a stranger..

Last edited by comet--berkeley; 26th January 2013 at 05:53 PM. Reason: clarify sshd server
Reply With Quote