Latest news that Linux had been potentially attack by some of the method it use to steal the SSH key to gain root access to the potential system.
According to US-CERT, the attack appears to rely on stolen SSH keys to gain access to a system. It then uses a local kernel exploit to gain root access, whereupon it installs the "phalanx2" rootkit, derived from the older "phalanx" rootkit.
For more information, please refer to this link
http://www.informationweek.com/news/software/linux/showArticle.jhtml?articleID=210201115
No comments:
Post a Comment