Another Red Hat Backdoor Article

    Date27 Apr 2000
    3938
    Posted ByAnthony Pell
    Here is another article on on Red Hat's backdoor. "What is characterized as a major security flaw in one of the most popular Web server software programs was discovered this week. A downloadable correction "patch" already has been issued, according . . . Here is another article on on Red Hat's backdoor. "What is characterized as a major security flaw in one of the most popular Web server software programs was discovered this week. A downloadable correction "patch" already has been issued, according to the Internet security team that discovered the breach.

    Chris Rouland, director of Internet Security System's "X-Force" team of security experts, told Newsbytes Tuesday that the flaw in the Red Hat Linux Piranha product was being given a Level 5 rating, for "most severe," by the security firm.


    The problem, which was discovered during a routine ISS check of the Red Hat software, is particularly problematic because it is so simple, Rouland said.

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Do you read our distribution advisories on a regular basis?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    23
    radio
    [{"id":"84","title":"Yes, for a single distribution","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"85","title":"Yes, for multiple distributions","votes":"6","type":"x","order":"2","pct":60,"resources":[]},{"id":"86","title":"No","votes":"4","type":"x","order":"3","pct":40,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.