¡¾Â©¶´Í¨¸æ¡¿SLPÐÒé¾Ü¾ø·þÎñ©¶´£¨CVE-2023-29552£©
Ðû²¼Ê±¼ä 2023-04-26Ò»¡¢Â©¶´¸ÅÊö
CVE ID | CVE-2023-29552 | ·¢ÏÖʱ¼ä | 2023-04-26 |
Àà ÐÍ | Dos | µÈ ¼¶ | ¸ßΣ |
Ô¶³ÌÀûÓà | ÊÇ | ËùÐèȨÏÞ | |
¹¥»÷ÅÓ´ó¶È | µÍ | Óû§½»»¥ | ·ñ |
PoC/EXP | ÔÚÒ°ÀûÓÃ |
·þÎñ¶¨Î»ÐÒ飨Service Location Protocol£¬Ëõд£ºSLP£©ÊÇÒ»ÖÖ·þÎñ·¢ÏÖÐÒ飬Ëüʹ¼ÆËã»ú»òÆäËüÉ豸¿ÉÒÔÔÚÎÞÐèÔ¤ÏÈÉèÖõÄÇé¿öÏÂÔÚ¾ÖÓòÍøÖвéÕÒ·þÎñ×ÊÔ´£¬Èç´òÓ¡»ú¡¢Îļþ·þÎñÆ÷ºÍÆäËüÍøÂç×ÊÔ´µÈ£¬¸ÃÐÒéÔÚRFC 2608ÓëRFC 3224Öнç˵¡£
4ÔÂ25ÈÕ£¬¶«Éƽ̨VSRC¼à²âµ½Bitsight¹ûÈ»ÁË·þÎñ¶¨Î»ÐÒ飨SLP£©ÖеÄÒ»¸ö¾Ü¾ø·þÎñ©¶´£¨CVE-2023-29552£©£¬ÆäCVSSÆÀ·ÖΪ8.6¡£¸Ã©¶´¿ÉÄܵ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄÔ¶³ÌÍþвÕßÔÚ SLP ·þÎñÆ÷ÉÏ×¢²áÈÎÒâ·þÎñ£¬²¢Ê¹ÓÃÆÛÆÐÔ UDP Á÷Á¿¶ÔÄ¿±êÌᳫ·´ÉäÐÍ DoS ·Å´ó¹¥»÷¡£
ÐèҪעÒâµÄÊÇ£¬ÍþвÕß¿ÉÒÔÀûÓÃÊÜÓ°ÏìµÄSLPʵÀýÌᳫ¸ß´ï2200 ±¶µÄ´ó¹æÄ£¾Ü¾ø·þÎñ (DoS) ·Å´ó¹¥»÷£¬Õâ¿ÉÄÜʹÆä³ÉΪÓÐÊ·ÒÔÀ´×î´óµÄ·Å´ó¹¥»÷Ö®Ò»£¬²¢½«¶ÔÄ¿±êÍøÂç»ò·þÎñÆ÷·¢ÉúÖØ´óÓ°Ïì¡£
Ŀǰ£¬»¥ÁªÍøÉÏ´æÔÚÁè¼Ý2000¸ö×éÖ¯ÕýÔÚʹÓõÄÉ豸̻¶ÁËԼĪ54000¸ö¿ÉÀûÓõÄSLPʵÀý£¬ÕâЩSLPʵÀý¿ÉÄܵ¼ÖÂDDoS·Å´ó¹¥»÷¡£Ò×Êܹ¥»÷µÄ·þÎñ°üÂÞVMWare ESXi Hypervisor¡¢Konica Minolta ´òÓ¡»ú¡¢Planex ·ÓÉÆ÷¡¢IBM ¼¯³É¹ÜÀíÄ£¿é (IMM)¡¢SMC IPMI ºÍ 665 ÖÖÆäËü²úÎïÀàÐÍ¡£×îÒ×Êܹ¥»÷µÄʵÀýλÓÚÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾¡¢µÂ¹ú¡¢¼ÓÄô󡢷¨¹ú¡¢Òâ´óÀû¡¢°ÍÎ÷¡¢ºÉÀ¼ºÍÎ÷°àÑÀ£¬Éæ¼°¼¼Êõ¡¢µçÐÅ¡¢Ò½ÁƱ£½¡¡¢±£ÏÕ¡¢½ðÈÚ¡¢¾ÆµêºÍ½»Í¨µÈÐÐÒµ¡£
¶þ¡¢Ó°Ï췶Χ
ËùÓÐÔÚ²»ÊÜÐÅÈεÄÍøÂ磨ÈçÖ±½ÓÁ¬½Óµ½ Internet µÄϵͳ£©ÉÏÔËÐеÄSLPʵÀý¡£
Ò×Êܹ¥»÷µÄ·þÎñ°üÂÞ£ºVMWare ESXi Hypervisor¡¢Konica Minolta ´òÓ¡»ú¡¢Planex ·ÓÉÆ÷¡¢IBM ¼¯³É¹ÜÀíÄ£¿é (IMM)¡¢SMC IPMI ºÍ 665 ÖÖÆäËü²úÎïÀàÐÍ¡£
Èý¡¢Äþ¾²´ëÊ©
3.1 Éý¼¶°æ±¾
ĿǰVMwareÒѾ¶Ô¸Ã©¶´×÷³öÏìÓ¦£¬²¢È·Èϵ±Ç°Ö§³ÖµÄ ESXi °æ±¾£¨ESXi 7.x ºÍ 8.x ϵÁУ©²»ÊÜÓ°Ï죬µ«Òѵ½´ïÒ»°ãÖ§³ÖÖÕÖ¹ (EOGS) µÄ°æ±¾£¨ÀýÈç 6.7 ºÍ 6.5£©»áÊܵ½ CVE-2023-29552 µÄÓ°Ï죬ÏêÇé¿É²Î¿¼£º
https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html
3.2 ÁÙʱ´ëÊ©
ÆóÒµ»ò×éÖ¯Ó¦ÔÚ̻¶ÓÚ»¥ÁªÍø»ò²»ÊÜÐÅÈÎÍøÂçµÄϵͳÉϽûÓÃSLP¡£
Èç²»ÄܽûÓÃSLP£¬¿ÉÒÔÅäÖ÷À»ðǽÀ´¹ýÂËTCPºÍUDP¶Ë¿Ú427ÉϵÄÁ÷Á¿£¬ÕâÊÇÀûÓà SLP ·þÎñµÄ¶ñÒâÇëÇóµÄÖ÷ÒªÈë¿Ú¡£
3.3 ͨÓý¨Òé
l ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡£¬¼õÉÙϵͳ©¶´£¬ÌáÉý·þÎñÆ÷µÄÄþ¾²ÐÔ¡£
l ¼ÓǿϵͳºÍÍøÂçµÄ·ÃÎÊ¿ØÖÆ£¬Ð޸ķÀ»ðǽ¼ÆÄ±£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ£¬¼õÉÙ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬¼õÉÙ¹¥»÷Ãæ¡£
l ʹÓÃÆóÒµ¼¶Äþ¾²²úÎÌáÉýÆóÒµµÄÍøÂçÄþ¾²ÐÔÄÜ¡£
l ¼ÓǿϵͳÓû§ºÍȨÏÞ¹ÜÀí£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬Óû§ºÍÈí¼þȨÏÞÓ¦±£³ÖÔÚ×îµÍÏÞ¶È¡£
l ÆôÓÃÇ¿ÃÜÂë¼ÆÄ±²¢ÉèÖÃΪ¶¨ÆÚÐ޸ġ£
3.4 ²Î¿¼Á´½Ó
https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp
https://www.bleepingcomputer.com/news/security/new-slp-bug-can-lead-to-massive-2-200x-ddos-amplification-attacks/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2023-04-26 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 ¶«Éƽ̨¼ò½é
¶«Éƽ̨½¨Á¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Äþ¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Äþ¾²²úÎï¡¢Äþ¾²·þÎñ½â¾ö·½°¸µÄÁ캽ÆóÒµÖ®Ò»¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¶«Éƽ̨´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ÓµÓÐÁýÕÖÈ«¹úµÄÏúÊÛÌåϵ¡¢ÇþµÀÌåϵºÍ¼¼ÊõÖ§³ÖÌåϵ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬¶«Éƽ̨ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´ÐµÄÄþ¾²²úÎïºÍ×î¼Ñʵ¼ù·þÎñ£¬×ÊÖú¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄÄþ¾²ÐÔºÍÉú²úЧÄÜ£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Äþ¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Å¬Á¦¡£
5.2 ¹ØÓÚ¶«Éƽ̨
¶«Éƽ̨Äþ¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸ö©¶´Í¨¸æºÍ·çÏÕÔ¤¾¯£¬ÎÒÃǽ«Á¬Ðø¸ú×ÙÈ«Çò×îеÄÍøÂçÄþ¾²Ê¼þºÍ©¶´£¬ÎªÆóÒµµÄÐÅÏ¢Äþ¾²±£¼Ý»¤º½¡£
¹Ø×¢ÎÒÃÇ£º