Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-6387 PoC — Openssh: regresshion - race condition in ssh allows rce/dos

Source
Associated Vulnerability
Title:Openssh: regresshion - race condition in ssh allows rce/dos (CVE-2024-6387)
Description:A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
Description
Welcome to the CVE-2024-6387 OpenSSH Vulnerability Checker repository!  This project offers multiple scripts to check the installed version of OpenSSH on your system and determine if it is vulnerable to CVE-2024-6387. It supports various environments, including Ubuntu, Mac, and Windows.
Readme
# CVE-2024-6387-OpenSSH-Vulnerability-Checker
This repository contains a Bash script to check the OpenSSH version on Ubuntu systems and determine if it's vulnerable to known security issues.
<img width="1092" alt="image" src="https://github.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker/assets/11604783/038d04e2-8e16-4aea-8739-41a136c238f0">

## Features ##
- Checks the installed OpenSSH version on the system.
- Determines if the version is vulnerable to known security issues.
- Provides vulnerability status based on version number.

## Usage ##
There are two ways to run the script: 

### Method 1: Download and Execute
- Download the script.
- Give the script execution permissions:
```bash
chmod +x CVE-2024-6387-OpenSSH-Vulnerability-Checker.sh
```

- Run the script: 
```bash
./CVE-2024-6387-OpenSSH-Vulnerability-Checker.sh
```

### Method 2: Execute Directly Using curl ###
You can directly download and execute the script using the following command:
```bash
curl https://raw.githubusercontent.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker/main/CVE-2024-6387-OpenSSH-Vulnerability-Checker.sh | bash -
```
Note: Always review the script content before executing it.

### Method 3: Execute Python Script Directly ###
To directly download and execute the Python script, use the following command:
```bash
curl https://raw.githubusercontent.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker/main/CVE-2024-6387-OpenSSH-Vulnerability-Checker.py | python3 -
```
Note: Always review the script content before executing it.

### Method 4: Execute Go Script Directly ###
To directly download and execute the Go script, use the following command:
```bash
curl https://raw.githubusercontent.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker/main/CVE-2024-6387-OpenSSH-Vulnerability-Checker.go -o CVE-2024-6387-OpenSSH-Vulnerability-Checker.go
go run CVE-2024-6387-OpenSSH-Vulnerability-Checker.go
```
Note: Always review the script content before executing it.

### Method 5: Build and Execute Go Script ###
- Make sure you have Go installed on your system.
- Download the Go script:
```bash
git clone https://github.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker
```
- Build the script for your platform using build_go.sh:
```bash
bash ./build_go.sh
```
- Execute the built file:
```bash
./build/CVE-2024-6387-OpenSSH-Vulnerability-Checker-<your-platform>
```

## Notes ##
This script has been tested on Ubuntu and Mac systems. The script results are for reference only. 
For a thorough security assessment, consult with a security expert. 
If a vulnerable version is detected, consult with your system administrator to apply appropriate updates or patches.

## Contributing ##
Bug reports, feature suggestions, and pull requests are welcome. Please submit your ideas through issues.
File Snapshot

[4.0K] /data/pocs/0b842b570a08b371ee0f02421526d83dece3a248 ├── [1.2K] build_go.sh ├── [2.2K] CVE-2024-6387-OpenSSH-Vulnerability-Checker.dart ├── [2.6K] CVE-2024-6387-OpenSSH-Vulnerability-Checker.go ├── [2.0K] CVE-2024-6387-OpenSSH-Vulnerability-Checker.py ├── [2.0K] CVE-2024-6387-OpenSSH-Vulnerability-Checker.sh ├── [ 34K] LICENSE └── [2.8K] README.md 0 directories, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →