baseless_discourse, (edited )

Yeah, but the malicious code replaces the ssh signature verification function to let it allow a specific signature. Hence attacker, with the key, can ssh into any system without proper authentication by ssh.

This kind of describes authentication by-pass, not just remote code execution…

EDIT: it is remote code execution, see the edit of parent comment.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • linux@lemmy.ml
  • normalnudes
  • DreamBathrooms
  • mdbf
  • magazineikmin
  • InstantRegret
  • Durango
  • Youngstown
  • slotface
  • thenastyranch
  • love
  • kavyap
  • GTA5RPClips
  • modclub
  • khanakhh
  • megavids
  • ngwrru68w68
  • everett
  • osvaldo12
  • rosin
  • ethstaker
  • Leos
  • anitta
  • cubers
  • tacticalgear
  • cisconetworking
  • provamag3
  • tester
  • JUstTest
  • All magazines