Created
March 30, 2024 00:44
-
-
Save wataken44/771fa8acf26dada5c6182c1fabf1174c to your computer and use it in GitHub Desktop.
xz backdoor detect.sh
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#! /bin/bash | |
set -eu | |
# find path to liblzma used by sshd | |
path="$(ldd $(which sshd) | grep liblzma | grep -o '/[^ ]*')" | |
# does it even exist? | |
if [ "$path" == "" ] | |
then | |
echo probably not vulnerable | |
exit | |
fi | |
# check for function signature | |
if hexdump -ve '1/1 "%.2x"' "$path" | grep -q f30f1efa554889f54c89ce5389fb81e7000000804883ec28488954241848894c2410 | |
then | |
echo probably vulnerable | |
else | |
echo probably not vulnerable | |
fi | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
copied from https://www.openwall.com/lists/oss-security/2024/03/29/4 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment