This repository contains a Bash script to check the OpenSSH version on Ubuntu systems and determine if it's vulnerable to known security issues.

- Checks the installed OpenSSH version on the system.
- Determines if the version is vulnerable to known security issues.
- Provides vulnerability status based on version number.
There are two ways to run the script:
- Download the script.
- Give the script execution permissions:
chmod +x CVE-2024-6387-OpenSSH-Vulnerability-Checker.sh- Run the script:
./CVE-2024-6387-OpenSSH-Vulnerability-Checker.shYou can directly download and execute the script using the following command:
curl https://raw.githubusercontent.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker/main/CVE-2024-6387-OpenSSH-Vulnerability-Checker.sh | bash -Note: Always review the script content before executing it.
To directly download and execute the Python script, use the following command:
curl https://raw.githubusercontent.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker/main/CVE-2024-6387-OpenSSH-Vulnerability-Checker.py | python3 -Note: Always review the script content before executing it.
To directly download and execute the Go script, use the following command:
curl https://raw.githubusercontent.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker/main/CVE-2024-6387-OpenSSH-Vulnerability-Checker.go -o CVE-2024-6387-OpenSSH-Vulnerability-Checker.go
go run CVE-2024-6387-OpenSSH-Vulnerability-Checker.goNote: Always review the script content before executing it.
- Make sure you have Go installed on your system.
- Download the Go script:
git clone https://github.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker- Build the script for your platform using build_go.sh:
bash ./build_go.sh- Execute the built file:
./build/CVE-2024-6387-OpenSSH-Vulnerability-Checker-<your-platform>This script has been tested on Ubuntu and Mac systems. The script results are for reference only. For a thorough security assessment, consult with a security expert. If a vulnerable version is detected, consult with your system administrator to apply appropriate updates or patches.
Bug reports, feature suggestions, and pull requests are welcome. Please submit your ideas through issues.