Add VSFTPD 2.3.4 backdoor incident to the inventory.
Between June 30 and July 1, 2011, the official vsftpd-2.3.4.tar.gz source archive was compromised with a malicious backdoor. When a client connects and uses the username :), the server opens a shell on TCP port 6200, allowing unauthenticated remote command execution.
Section: TBD
Type: supply chain compromise / remote code execution