Skip to content

Welcome to the CVE-2024-6387 OpenSSH Vulnerability Checker repository! This project offers multiple scripts to check the installed version of OpenSSH on your system and determine if it is vulnerable to CVE-2024-6387. It supports various environments, including Ubuntu, Mac, and Windows.

License

Notifications You must be signed in to change notification settings

turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker

Repository files navigation

CVE-2024-6387-OpenSSH-Vulnerability-Checker

This repository contains a Bash script to check the OpenSSH version on Ubuntu systems and determine if it's vulnerable to known security issues. image

Features

  • Checks the installed OpenSSH version on the system.
  • Determines if the version is vulnerable to known security issues.
  • Provides vulnerability status based on version number.

Usage

There are two ways to run the script:

Method 1: Download and Execute

  • Download the script.
  • Give the script execution permissions:
chmod +x CVE-2024-6387-OpenSSH-Vulnerability-Checker.sh
  • Run the script:
./CVE-2024-6387-OpenSSH-Vulnerability-Checker.sh

Method 2: Execute Directly Using curl

You can directly download and execute the script using the following command:

curl https://raw.githubusercontent.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker/main/CVE-2024-6387-OpenSSH-Vulnerability-Checker.sh | bash -

Note: Always review the script content before executing it.

Method 3: Execute Python Script Directly

To directly download and execute the Python script, use the following command:

curl https://raw.githubusercontent.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker/main/CVE-2024-6387-OpenSSH-Vulnerability-Checker.py | python3 -

Note: Always review the script content before executing it.

Method 4: Execute Go Script Directly

To directly download and execute the Go script, use the following command:

curl https://raw.githubusercontent.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker/main/CVE-2024-6387-OpenSSH-Vulnerability-Checker.go -o CVE-2024-6387-OpenSSH-Vulnerability-Checker.go
go run CVE-2024-6387-OpenSSH-Vulnerability-Checker.go

Note: Always review the script content before executing it.

Method 5: Build and Execute Go Script

  • Make sure you have Go installed on your system.
  • Download the Go script:
git clone https://github.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker
  • Build the script for your platform using build_go.sh:
bash ./build_go.sh
  • Execute the built file:
./build/CVE-2024-6387-OpenSSH-Vulnerability-Checker-<your-platform>

Notes

This script has been tested on Ubuntu and Mac systems. The script results are for reference only. For a thorough security assessment, consult with a security expert. If a vulnerable version is detected, consult with your system administrator to apply appropriate updates or patches.

Contributing

Bug reports, feature suggestions, and pull requests are welcome. Please submit your ideas through issues.

About

Welcome to the CVE-2024-6387 OpenSSH Vulnerability Checker repository! This project offers multiple scripts to check the installed version of OpenSSH on your system and determine if it is vulnerable to CVE-2024-6387. It supports various environments, including Ubuntu, Mac, and Windows.

Topics

Resources

License

Stars

Watchers

Forks