- Mar 9, 2000
- 13,076
- 1
- 0
Three months ago, the experienced system administrator put his newest Linux server online. Three days later, an intruder had taken control of it.
Exploiting a flaw in Washington University's FTP server, the intruder had cracked the server's security and set up shop. Hall's system--in this case, Red Hat 6.2--shipped with the software that contained the hole. While a patch for the vulnerability was readily available on Red Hat's Web site, like many other system administrators, Hall just didn't get around to installing it.
Link
Exploiting a flaw in Washington University's FTP server, the intruder had cracked the server's security and set up shop. Hall's system--in this case, Red Hat 6.2--shipped with the software that contained the hole. While a patch for the vulnerability was readily available on Red Hat's Web site, like many other system administrators, Hall just didn't get around to installing it.
Link