This repository contains a Bash script to check the OpenSSH version on Ubuntu systems and determine if it's vulnerable to known security issues.
- Checks the installed OpenSSH version on the system.
- Determines if the version is vulnerable to known security issues.
- Provides vulnerability status based on version number.
There are two ways to run the script:
- Download the script.
- Give the script execution permissions:
chmod +x CVE-2024-6387-OpenSSH-Vulnerability-Checker.sh
- Run the script:
./CVE-2024-6387-OpenSSH-Vulnerability-Checker.sh
You can directly download and execute the script using the following command:
curl https://raw.githubusercontent.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker/main/CVE-2024-6387-OpenSSH-Vulnerability-Checker.sh | bash -
Note: Always review the script content before executing it.
To directly download and execute the Python script, use the following command:
curl https://raw.githubusercontent.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker/main/CVE-2024-6387-OpenSSH-Vulnerability-Checker.py | python3 -
Note: Always review the script content before executing it.
To directly download and execute the Go script, use the following command:
curl https://raw.githubusercontent.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker/main/CVE-2024-6387-OpenSSH-Vulnerability-Checker.go -o CVE-2024-6387-OpenSSH-Vulnerability-Checker.go
go run CVE-2024-6387-OpenSSH-Vulnerability-Checker.go
Note: Always review the script content before executing it.
- Make sure you have Go installed on your system.
- Download the Go script:
git clone https://github.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker
- Build the script for your platform using build_go.sh:
bash ./build_go.sh
- Execute the built file:
./build/CVE-2024-6387-OpenSSH-Vulnerability-Checker-<your-platform>
This script has been tested on Ubuntu and Mac systems. The script results are for reference only. For a thorough security assessment, consult with a security expert. If a vulnerable version is detected, consult with your system administrator to apply appropriate updates or patches.
Bug reports, feature suggestions, and pull requests are welcome. Please submit your ideas through issues.