Quote:
Originally Posted by comet--berkeley
The article does not describe a vulnerability particular to Linux.
Any system with an sshd server is "vulnerable" if the sshd server can be replaced by a stranger..
|
Not only stranger.... even a "trusted" user