¡¾Â©¶´Í¨¸æ¡¿SLPЭÒé¾Ü¾ø·þÎñ©¶´£¨CVE-2023-29552£©

Ðû²¼Ê±¼ä 2023-04-26


Ò»¡¢Â©¶´¸ÅÊö

CVE   ID

CVE-2023-29552

·¢ÏÖʱ¼ä

2023-04-26

Àà    ÐÍ

Dos

µÈ    ¼¶

¸ßΣ

Ô¶³ÌÀûÓÃ

ÊÇ

ËùÐèȨÏÞ


¹¥»÷ÅÓ´ó¶È

µÍ

Óû§½»»¥

·ñ

PoC/EXP


ÔÚÒ°ÀûÓÃ


 

·þÎñ¶¨Î»Ð­Ò飨Service Location Protocol £¬Ëõд£ºSLP£©ÊÇÒ»ÖÖ·þÎñ·¢ÏÖЭÒé £¬Ëüʹ¼ÆËã»ú»òÆäËüÉ豸¿ÉÒÔÔÚÎÞÐèÔ¤ÏÈÉèÖõÄÇé¿öÏÂÔÚ¾ÖÓòÍøÖвéÕÒ·þÎñ×ÊÔ´ £¬Èç´òÓ¡»ú¡¢Îļþ·þÎñÆ÷ºÍÆäËüÍøÂç×ÊÔ´µÈ £¬¸ÃЭÒéÔÚRFC 2608ÓëRFC 3224Öнç˵¡£

4ÔÂ25ÈÕ £¬¶¶È¦Îª¶Ä¶øÉúVSRC¼à²âµ½Bitsight¹ûÈ»ÁË·þÎñ¶¨Î»Ð­Ò飨SLP£©ÖеÄÒ»¸ö¾Ü¾ø·þÎñ©¶´£¨CVE-2023-29552£© £¬ÆäCVSSÆÀ·ÖΪ8.6¡£¸Ã©¶´¿ÉÄܵ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³ÌÍþвÕßÔÚ SLP ·þÎñÆ÷ÉÏ×¢²áÈÎÒâ·þÎñ £¬²¢Ê¹ÓÃÆÛÆ­ÐÔ UDP Á÷Á¿¶ÔÄ¿±êÌᳫ·´ÉäÐÍ DoS ·Å´ó¹¥»÷¡£

ÐèҪעÒâµÄÊÇ £¬ÍþвÕß¿ÉÒÔÀûÓÃÊÜÓ°ÏìµÄSLPʵÀýÌᳫ¸ß´ï2200 ±¶µÄ´ó¹æÄ£¾Ü¾ø·þÎñ (DoS) ·Å´ó¹¥»÷ £¬Õâ¿ÉÄÜʹÆä³ÉΪÓÐÊ·ÒÔÀ´×î´óµÄ·Å´ó¹¥»÷Ö®Ò» £¬²¢½«¶ÔÄ¿±êÍøÂç»ò·þÎñÆ÷·¢ÉúÖØ´óÓ°Ïì¡£

Ŀǰ £¬»¥ÁªÍøÉÏ´æÔÚÁè¼Ý2000¸ö×éÖ¯ÕýÔÚʹÓõÄÉ豸̻¶ÁËԼĪ54000¸ö¿ÉÀûÓõÄSLPʵÀý £¬ÕâЩSLPʵÀý¿ÉÄܵ¼ÖÂDDoS·Å´ó¹¥»÷¡£Ò×Êܹ¥»÷µÄ·þÎñ°üÂÞVMWare ESXi Hypervisor¡¢Konica Minolta ´òÓ¡»ú¡¢Planex ·ÓÉÆ÷¡¢IBM ¼¯³É¹ÜÀíÄ £¿é (IMM)¡¢SMC IPMI ºÍ 665 ÖÖÆäËü²úÎïÀàÐÍ¡£×îÒ×Êܹ¥»÷µÄʵÀýλÓÚÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾¡¢µÂ¹ú¡¢¼ÓÄô󡢷¨¹ú¡¢Òâ´óÀû¡¢°ÍÎ÷¡¢ºÉÀ¼ºÍÎ÷°àÑÀ £¬Éæ¼°¼¼Êõ¡¢µçÐÅ¡¢Ò½ÁƱ£½¡¡¢±£ÏÕ¡¢½ðÈÚ¡¢¾ÆµêºÍ½»Í¨µÈÐÐÒµ¡£

 

¶þ¡¢Ó°Ï췶Χ

ËùÓÐÔÚ²»ÊÜÐÅÈεÄÍøÂ磨ÈçÖ±½ÓÁ¬½Óµ½ Internet µÄϵͳ£©ÉÏÔËÐеÄSLPʵÀý¡£

Ò×Êܹ¥»÷µÄ·þÎñ°üÂÞ£ºVMWare ESXi Hypervisor¡¢Konica Minolta ´òÓ¡»ú¡¢Planex ·ÓÉÆ÷¡¢IBM ¼¯³É¹ÜÀíÄ £¿é (IMM)¡¢SMC IPMI ºÍ 665 ÖÖÆäËü²úÎïÀàÐÍ¡£

 

Èý¡¢Äþ¾²´ëÊ©

3.1 Éý¼¶°æ±¾

ĿǰVMwareÒѾ­¶Ô¸Ã©¶´×÷³öÏìÓ¦ £¬²¢È·Èϵ±Ç°Ö§³ÖµÄ ESXi °æ±¾£¨ESXi 7.x ºÍ 8.x ϵÁУ©²»ÊÜÓ°Ïì £¬µ«Òѵ½´ïÒ»°ãÖ§³ÖÖÕÖ¹ (EOGS) µÄ°æ±¾£¨ÀýÈç 6.7 ºÍ 6.5£©»áÊܵ½ CVE-2023-29552 µÄÓ°Ïì £¬ÏêÇé¿É²Î¿¼£º

https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html

3.2 ÁÙʱ´ëÊ©

ÆóÒµ»ò×éÖ¯Ó¦ÔÚ̻¶ÓÚ»¥ÁªÍø»ò²»ÊÜÐÅÈÎÍøÂçµÄϵͳÉϽûÓÃSLP¡£

Èç²»ÄܽûÓÃSLP £¬¿ÉÒÔÅäÖ÷À»ðǽÀ´¹ýÂËTCPºÍUDP¶Ë¿Ú427ÉϵÄÁ÷Á¿ £¬ÕâÊÇÀûÓà SLP ·þÎñµÄ¶ñÒâÇëÇóµÄÖ÷ÒªÈë¿Ú¡£

3.3 ͨÓý¨Òé

l  ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡ £¬¼õÉÙϵͳ©¶´ £¬ÌáÉý·þÎñÆ÷µÄÄþ¾²ÐÔ¡£

l  ¼ÓǿϵͳºÍÍøÂçµÄ·ÃÎÊ¿ØÖÆ £¬Ð޸ķÀ»ðǽ¼ÆÄ± £¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ £¬¼õÉÙ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø £¬¼õÉÙ¹¥»÷Ãæ¡£

l  ʹÓÃÆóÒµ¼¶Äþ¾²²úÎï £¬ÌáÉýÆóÒµµÄÍøÂçÄþ¾²ÐÔÄÜ¡£

l  ¼ÓǿϵͳÓû§ºÍȨÏÞ¹ÜÀí £¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔ­Ôò £¬Óû§ºÍÈí¼þȨÏÞÓ¦±£³ÖÔÚ×îµÍÏÞ¶È¡£

l  ÆôÓÃÇ¿ÃÜÂë¼ÆÄ±²¢ÉèÖÃΪ¶¨ÆÚÐ޸ġ£

3.4 ²Î¿¼Á´½Ó

https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp

https://www.bleepingcomputer.com/news/security/new-slp-bug-can-lead-to-massive-2-200x-ddos-amplification-attacks/

 

ËÄ¡¢°æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

±¸×¢

V1.0

2023-04-26

Ê×´ÎÐû²¼

 

Îå¡¢¸½Â¼

5.1 ¶¶È¦Îª¶Ä¶øÉú¼ò½é

¶¶È¦Îª¶Ä¶øÉú½¨Á¢ÓÚ1996Äê £¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Äþ¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Äþ¾²²úÎï¡¢Äþ¾²·þÎñ½â¾ö·½°¸µÄÁ캽ÆóÒµÖ®Ò»¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¶¶È¦Îª¶Ä¶øÉú´óÏà £¬¹«Ë¾Ô±¹¤6000ÓàÈË £¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö £¬ÓµÓÐÁýÕÖÈ«¹úµÄÏúÊÛÌåϵ¡¢ÇþµÀÌåϵºÍ¼¼ÊõÖ§³ÖÌåϵ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´ £¬¶¶È¦Îª¶Ä¶øÉúÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´ÐµÄÄþ¾²²úÎïºÍ×î¼Ñʵ¼ù·þÎñ £¬×ÊÖú¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄÄþ¾²ÐÔºÍÉú²úЧÄÜ £¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Äþ¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Å¬Á¦¡£

5.2 ¹ØÓÚ¶¶È¦Îª¶Ä¶øÉú

¶¶È¦Îª¶Ä¶øÉúÄþ¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸ö©¶´Í¨¸æºÍ·çÏÕÔ¤¾¯ £¬ÎÒÃǽ«Á¬Ðø¸ú×ÙÈ«Çò×îеÄÍøÂçÄþ¾²Ê¼þºÍ©¶´ £¬ÎªÆóÒµµÄÐÅÏ¢Äþ¾²±£¼Ý»¤º½¡£

¹Ø×¢ÎÒÃÇ£º

image.png