¡¾Â©¶´Í¨¸æ¡¿SLPЭÒé¾Ü¾ø·þÎñ©¶´£¨CVE-2023-29552£©

Ðû²¼Ê±¼ä 2023-04-26


Ò»¡¢Â©¶´¸ÅÊö

CVE   ID

CVE-2023-29552

·¢ÏÖʱ¼ä

2023-04-26

Àà    ÐÍ

Dos

µÈ    ¼¶

¸ßΣ

Ô¶³ÌÀûÓÃ

ÊÇ

ËùÐèȨÏÞ


¹¥»÷ÅÓ´ó¶È

µÍ

Óû§½»»¥

·ñ

PoC/EXP


ÔÚÒ°ÀûÓÃ


 

·þÎñ¶¨Î»Ð­Ò飨Service Location Protocol£¬Ëõд£ºSLP£©ÊÇÒ»ÖÖ·þÎñ·¢ÏÖЭÒ飬Ëüʹ¼ÆËã»ú»òÆäËüÉ豸¿ÉÒÔÔÚÎÞÐèÔ¤ÏÈÉèÖõÄÇé¿öÏÂÔÚ¾ÖÓòÍøÖвéÕÒ·þÎñ×ÊÔ´£¬Èç´òÓ¡»ú¡¢Îļþ·þÎñÆ÷ºÍÆäËüÍøÂç×ÊÔ´µÈ£¬¸ÃЭÒéÔÚRFC 2608ÓëRFC 3224Öнç˵¡£

4ÔÂ25ÈÕ£¬¶«É­Æ½Ì¨VSRC¼à²âµ½Bitsight¹ûÈ»ÁË·þÎñ¶¨Î»Ð­Ò飨SLP£©ÖеÄÒ»¸ö¾Ü¾ø·þÎñ©¶´£¨CVE-2023-29552£©£¬ÆäCVSSÆÀ·ÖΪ8.6¡£¸Ã©¶´¿ÉÄܵ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³ÌÍþвÕßÔÚ SLP ·þÎñÆ÷ÉÏ×¢²áÈÎÒâ·þÎñ£¬²¢Ê¹ÓÃÆÛÆ­ÐÔ UDP Á÷Á¿¶ÔÄ¿±êÌᳫ·´ÉäÐÍ DoS ·Å´ó¹¥»÷¡£

ÐèҪעÒâµÄÊÇ£¬ÍþвÕß¿ÉÒÔÀûÓÃÊÜÓ°ÏìµÄSLPʵÀýÌᳫ¸ß´ï2200 ±¶µÄ´ó¹æÄ£¾Ü¾ø·þÎñ (DoS) ·Å´ó¹¥»÷£¬Õâ¿ÉÄÜʹÆä³ÉΪÓÐÊ·ÒÔÀ´×î´óµÄ·Å´ó¹¥»÷Ö®Ò»£¬²¢½«¶ÔÄ¿±êÍøÂç»ò·þÎñÆ÷·¢ÉúÖØ´óÓ°Ïì¡£

Ŀǰ£¬»¥ÁªÍøÉÏ´æÔÚÁè¼Ý2000¸ö×éÖ¯ÕýÔÚʹÓõÄÉ豸̻¶ÁËԼĪ54000¸ö¿ÉÀûÓõÄSLPʵÀý£¬ÕâЩSLPʵÀý¿ÉÄܵ¼ÖÂDDoS·Å´ó¹¥»÷¡£Ò×Êܹ¥»÷µÄ·þÎñ°üÂÞVMWare ESXi Hypervisor¡¢Konica Minolta ´òÓ¡»ú¡¢Planex ·ÓÉÆ÷¡¢IBM ¼¯³É¹ÜÀíÄ£¿é (IMM)¡¢SMC IPMI ºÍ 665 ÖÖÆäËü²úÎïÀàÐÍ¡£×îÒ×Êܹ¥»÷µÄʵÀýλÓÚÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾¡¢µÂ¹ú¡¢¼ÓÄô󡢷¨¹ú¡¢Òâ´óÀû¡¢°ÍÎ÷¡¢ºÉÀ¼ºÍÎ÷°àÑÀ£¬Éæ¼°¼¼Êõ¡¢µçÐÅ¡¢Ò½ÁƱ£½¡¡¢±£ÏÕ¡¢½ðÈÚ¡¢¾ÆµêºÍ½»Í¨µÈÐÐÒµ¡£

 

¶þ¡¢Ó°Ï췶Χ

ËùÓÐÔÚ²»ÊÜÐÅÈεÄÍøÂ磨ÈçÖ±½ÓÁ¬½Óµ½ Internet µÄϵͳ£©ÉÏÔËÐеÄSLPʵÀý¡£

Ò×Êܹ¥»÷µÄ·þÎñ°üÂÞ£ºVMWare ESXi Hypervisor¡¢Konica Minolta ´òÓ¡»ú¡¢Planex ·ÓÉÆ÷¡¢IBM ¼¯³É¹ÜÀíÄ£¿é (IMM)¡¢SMC IPMI ºÍ 665 ÖÖÆäËü²úÎïÀàÐÍ¡£

 

Èý¡¢Äþ¾²´ëÊ©

3.1 Éý¼¶°æ±¾

ĿǰVMwareÒѾ­¶Ô¸Ã©¶´×÷³öÏìÓ¦£¬²¢È·Èϵ±Ç°Ö§³ÖµÄ ESXi °æ±¾£¨ESXi 7.x ºÍ 8.x ϵÁУ©²»ÊÜÓ°Ï죬µ«Òѵ½´ïÒ»°ãÖ§³ÖÖÕÖ¹ (EOGS) µÄ°æ±¾£¨ÀýÈç 6.7 ºÍ 6.5£©»áÊܵ½ CVE-2023-29552 µÄÓ°Ï죬ÏêÇé¿É²Î¿¼£º

https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html

3.2 ÁÙʱ´ëÊ©

ÆóÒµ»ò×éÖ¯Ó¦ÔÚ̻¶ÓÚ»¥ÁªÍø»ò²»ÊÜÐÅÈÎÍøÂçµÄϵͳÉϽûÓÃSLP¡£

Èç²»ÄܽûÓÃSLP£¬¿ÉÒÔÅäÖ÷À»ðǽÀ´¹ýÂËTCPºÍUDP¶Ë¿Ú427ÉϵÄÁ÷Á¿£¬ÕâÊÇÀûÓà SLP ·þÎñµÄ¶ñÒâÇëÇóµÄÖ÷ÒªÈë¿Ú¡£

3.3 ͨÓý¨Òé

l  ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡£¬¼õÉÙϵͳ©¶´£¬ÌáÉý·þÎñÆ÷µÄÄþ¾²ÐÔ¡£

l  ¼ÓǿϵͳºÍÍøÂçµÄ·ÃÎÊ¿ØÖÆ£¬Ð޸ķÀ»ðǽ¼ÆÄ±£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ£¬¼õÉÙ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬¼õÉÙ¹¥»÷Ãæ¡£

l  ʹÓÃÆóÒµ¼¶Äþ¾²²úÎÌáÉýÆóÒµµÄÍøÂçÄþ¾²ÐÔÄÜ¡£

l  ¼ÓǿϵͳÓû§ºÍȨÏÞ¹ÜÀí£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔ­Ôò£¬Óû§ºÍÈí¼þȨÏÞÓ¦±£³ÖÔÚ×îµÍÏÞ¶È¡£

l  ÆôÓÃÇ¿ÃÜÂë¼ÆÄ±²¢ÉèÖÃΪ¶¨ÆÚÐ޸ġ£

3.4 ²Î¿¼Á´½Ó

https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp

https://www.bleepingcomputer.com/news/security/new-slp-bug-can-lead-to-massive-2-200x-ddos-amplification-attacks/

 

ËÄ¡¢°æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

±¸×¢

V1.0

2023-04-26

Ê×´ÎÐû²¼

 

Îå¡¢¸½Â¼

5.1 ¶«É­Æ½Ì¨¼ò½é

¶«É­Æ½Ì¨½¨Á¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Äþ¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Äþ¾²²úÎï¡¢Äþ¾²·þÎñ½â¾ö·½°¸µÄÁ캽ÆóÒµÖ®Ò»¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¶«É­Æ½Ì¨´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ÓµÓÐÁýÕÖÈ«¹úµÄÏúÊÛÌåϵ¡¢ÇþµÀÌåϵºÍ¼¼ÊõÖ§³ÖÌåϵ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´£¬¶«É­Æ½Ì¨ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´ÐµÄÄþ¾²²úÎïºÍ×î¼Ñʵ¼ù·þÎñ£¬×ÊÖú¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄÄþ¾²ÐÔºÍÉú²úЧÄÜ£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Äþ¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Å¬Á¦¡£

5.2 ¹ØÓÚ¶«É­Æ½Ì¨

¶«É­Æ½Ì¨Äþ¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸ö©¶´Í¨¸æºÍ·çÏÕÔ¤¾¯£¬ÎÒÃǽ«Á¬Ðø¸ú×ÙÈ«Çò×îеÄÍøÂçÄþ¾²Ê¼þºÍ©¶´£¬ÎªÆóÒµµÄÐÅÏ¢Äþ¾²±£¼Ý»¤º½¡£

¹Ø×¢ÎÒÃÇ£º

image.png