Skip to content

Script for checking vulnerable software

Notifications You must be signed in to change notification settings

epasqualotto/CVE_checks

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

35 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Repository with scripts to verify system against CVE

Scripts to verify vulnerable software

Update: 02-02-2022 Added script to check Samba vulnerability CVE-2021-44142 (Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution)

Run with:

wget -q https://raw.githubusercontent.com/backloop-biz/CVE_checks/main/CVE-2021-4034.sh -O -|bash

or with older distribution (with no support for TLS...)

wget -q --no-check-certificate https://raw.githubusercontent.com/backloop-biz/CVE_checks/main/CVE-2021-4034.sh -O -|bash

Note: adding --fix the script try to patch the system

Example:

manager@elk2:~$ wget -qO - https://raw.githubusercontent.com/backloop-biz/CVE_checks/main/CVE-2021-4034.sh | bash

Detected O.S. : Ubuntu 20.04 focal

My version (0.105-26ubuntu1.1) is lower than version (0.105-26ubuntu1.2) with the patch

System vulnerable!

Example with auto-fix (require sudo):

manager@elk2:~$ wget -q https://raw.githubusercontent.com/backloop-biz/CVE_checks/main/CVE-2021-4034.sh -O -|sudo bash /dev/stdin --fix

Run with auto-fix enabled!

Detected O.S. : Ubuntu 20.04 focal

My version (0.105-26ubuntu1.1) is lower than version (0.105-26ubuntu1.2) with the patch

System vulnerable!

manager@elk2:~$ wget -q https://raw.githubusercontent.com/backloop-biz/CVE_checks/main/CVE-2021-4034.sh -O -|sudo bash /dev/stdin --fix

Run with auto-fix enabled!

Detected O.S. : Ubuntu 20.04 focal

My version (0.105-26ubuntu1.2) is same than version (0.105-26ubuntu1.2) with the patch

System not vulnerable

About

Script for checking vulnerable software

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 100.0%