Last week Red Hat had detected a compromise on some of its systems. Red Hat took immediate action on the compromise. It was found that the attacker was able to sign some OpenSSH packages for Red Hat Enterprise 4, and 5. Red Hat has released a shell script that can verify if any of them were installed on your system.
Red Hat Intrusion