¡¾Â©¶´Í¨¸æ¡¿Ivanti Avalanche¶à¸ö¸ßΣ©¶´
Ðû²¼Ê±¼ä 2023-08-16Ò»¡¢Â©¶´¸ÅÊö
Ivanti Avalanche£¨ÓÉ Wavelink Ìṩ֧³Ö£©ÊÇÒ»ÖÖÆóÒµÒÆ¶¯¹ÜÀí (EMM) ½â¾ö·½°¸£¬Ö¼ÔÚ¹ÜÀí¡¢¼à¿ØºÍ±£»¤ÖÖÖÖÒÆ¶¯É豸¡£
8ÔÂ16ÈÕ£¬¶¶È¦Îª¶Ä¶øÉúVSRC¼à²âµ½Ivanti AvalancheÖÐÐÞ¸´Á˶à¸öÄþ¾²Â©¶´£¬ÕâЩ©¶´¿ÉÄܵ¼ÖÂÉí·ÝÑéÖ¤ÈÆ¹ý¡¢ÎļþÉÏ´«¡¢Ä¿Â¼±éÀúºÍÔ¶³Ì´úÂëÖ´Ðеȣ¬ÏêÇéÈçÏ£º
CVE-2023-32560£ºIvanti Avalanche»ùÓÚ¶ÑÕ»µÄ»º³åÇøÒç³ö£¨¸ßΣ£©
¸Ã©¶´´æÔÚÓÚIvanti Avalanche WLAvalancheService.exeÖУ¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³ÌÍþвÕß¿Éͨ¹ýÏòTCP ¶Ë¿Ú 1777·¢ËÍÌØÖÆÏûÏ¢£¬¿ÉÄܵ¼ÖÂÔÚÄ¿±êϵͳÉÏÖ´ÐÐÈÎÒâ´úÂë»òÔì³É·þÎñÖжϣ¬¸Ã©¶´µÄϸ½ÚÒѹûÈ»¡£
CVE-2023-32561£ºIvanti AvalancheÉí·ÝÑéÖ¤ÈÆ¹ý©¶´£¨¸ßΣ£©
¸Ã©¶´´æÔÚÓÚIvanti Avalanche dumpHeapÒªÁìÖУ¬ÓÉÓÚȨÏÞ·ÖÅä²»ÕýÈ·£¬Ô¶³ÌÍþвÕß¿ÉÀûÓøÃ©¶´ÈƹýϵͳÉϵÄÉí·ÝÑéÖ¤¡£
CVE-2023-32562£ºIvanti AvalancheÎļþÉÏ´«Â©¶´£¨¸ßΣ£©
¸Ã©¶´´æÔÚÓÚIvanti Avalanche FileStoreConfig¶ËµãÖУ¬ÓÉÓÚ¶ÔÓû§ÌṩµÄÊý¾Ýȱ·¦Êʵ±ÑéÖ¤£¬¾¹ýÉí·ÝÑéÖ¤µÄÍþвÕß¿ÉÀûÓøÃ©¶´ÉÏ´«ÈÎÒâÎļþ£¬µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£
CVE-2023-32563£ºIvanti AvalancheĿ¼±éÀú©¶´£¨ÑÏÖØ£©
¸Ã©¶´´æÔÚÓÚIvanti Avalanche updateSkinÒªÁìÖУ¬ÓÉÓÚÔÚÎļþ²Ù×÷ÖÐʹÓÃÓû§ÌṩµÄ·¾¶Ö®Ç°Î´¶ÔÆä½øÐÐÕýÈ·ÑéÖ¤£¬µ¼ÖÂĿ¼±éÀú©¶´£¬Î´¾Éí·ÝÑéÖ¤µÄÍþвÕß¿ÉÀûÓøÃ©¶´Ô¶³ÌÖ´ÐдúÂë¡£
CVE-2023-32564£ºIvanti AvalancheÎļþÉÏ´«Â©¶´£¨¸ßΣ£©
¸Ã©¶´´æÔÚÓÚIvanti Avalanche FileStoreConfigÖУ¬ÓÉÓÚ¶ÔÓû§ÌṩµÄÊý¾Ýȱ·¦Êʵ±ÑéÖ¤£¬¾¹ýÉí·ÝÑéÖ¤µÄÍþвÕß¿ÉÀûÓøÃ©¶´ÉÏ´«ÈÎÒâÎļþ£¬µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£
CVE-2023-32565£ºIvanti Avalanche SecureFilter Content-TypeÉí·ÝÑéÖ¤ÈÆ¹ý©¶´£¨¸ßΣ£©
¸Ã©¶´´æÔÚÓÚIvanti Avalanche SecureFilterÀàÖУ¬ÓÉÓÚÔÚÊÚȨÂß¼Öв»ÕýÈ·µØÊ¹Óà Content-Type HTTP ±êÍ·£¬Ô¶³ÌÍþвÕß¿Éͨ¹ý·¢ËÍÌØÖÆÇëÇó£¬ÈƹýϵͳÉϵIJ¿ÃÅÉí·ÝÑéÖ¤¡£
CVE-2023-32566£ºIvanti Avalanche SecureFilter allowedPassThroughÉí·ÝÑéÖ¤ÈÆ¹ý©¶´£¨¸ßΣ£©
¸Ã©¶´´æÔÚÓÚIvanti Avalanche SecureFilter allowedPassThroughÒªÁìÖУ¬ÓÉÓÚ×ö³öÊÚȨ¾ö²ßʱ×Ö·û´®Æ¥Åä²»ÕýÈ·£¬Ô¶³ÌÍþвÕß¿Éͨ¹ý·¢ËÍÌØÖÆÇëÇó£¬ÈƹýϵͳÉϵIJ¿ÃÅÉí·ÝÑéÖ¤¡£
¶þ¡¢Ó°Ï췶Χ
Ivanti Avalanche°æ±¾ <= 6.4.0
Èý¡¢Äþ¾²´ëÊ©
3.1 Éý¼¶°æ±¾
ĿǰÕâЩ©¶´ÒѾÐÞ¸´£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔϰ汾£º
Ivanti Avalanche°æ±¾ >= 6.4.1.207
ÏÂÔØÁ´½Ó£º
https://forums.ivanti.com/s/avalanche-powered-by-wavelink?language=en_US
3.2 ÁÙʱ´ëÊ©
ÔÝÎÞ¡£
3.3 ͨÓý¨Òé
l ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡£¬¼õÉÙϵͳ©¶´£¬ÌáÉý·þÎñÆ÷µÄÄþ¾²ÐÔ¡£
l ¼ÓǿϵͳºÍÍøÂçµÄ·ÃÎÊ¿ØÖÆ£¬Ð޸ķÀ»ðǽ¼ÆÄ±£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ£¬¼õÉÙ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬¼õÉÙ¹¥»÷Ãæ¡£
l ʹÓÃÆóÒµ¼¶Äþ¾²²úÎÌáÉýÆóÒµµÄÍøÂçÄþ¾²ÐÔÄÜ¡£
l ¼ÓǿϵͳÓû§ºÍȨÏÞ¹ÜÀí£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬Óû§ºÍÈí¼þȨÏÞÓ¦±£³ÖÔÚ×îµÍÏÞ¶È¡£
l ÆôÓÃÇ¿ÃÜÂë¼ÆÄ±²¢ÉèÖÃΪ¶¨ÆÚÐ޸ġ£
3.4 ²Î¿¼Á´½Ó
https://forums.ivanti.com/s/article/Avalanche-Vulnerabilities-Addressed-in-6-4-1
https://www.tenable.com/security/research/tra-2023-27
https://www.bleepingcomputer.com/news/security/ivanti-avalanche-impacted-by-critical-pre-auth-stack-buffer-overflows/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2023-08-16 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 ¶¶È¦Îª¶Ä¶øÉú¼ò½é
¶¶È¦Îª¶Ä¶øÉú½¨Á¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Äþ¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Äþ¾²²úÎï¡¢Äþ¾²·þÎñ½â¾ö·½°¸µÄÁ캽ÆóÒµÖ®Ò»¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¶¶È¦Îª¶Ä¶øÉú´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ÓµÓÐÁýÕÖÈ«¹úµÄÏúÊÛÌåϵ¡¢ÇþµÀÌåϵºÍ¼¼ÊõÖ§³ÖÌåϵ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬¶¶È¦Îª¶Ä¶øÉúÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´ÐµÄÄþ¾²²úÎïºÍ×î¼Ñʵ¼ù·þÎñ£¬×ÊÖú¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄÄþ¾²ÐÔºÍÉú²úЧÄÜ£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Äþ¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Å¬Á¦¡£
5.2 ¹ØÓÚ¶¶È¦Îª¶Ä¶øÉú
¶¶È¦Îª¶Ä¶øÉúÄþ¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸ö©¶´Í¨¸æºÍ·çÏÕÔ¤¾¯£¬ÎÒÃǽ«Á¬Ðø¸ú×ÙÈ«Çò×îеÄÍøÂçÄþ¾²Ê¼þºÍ©¶´£¬ÎªÆóÒµµÄÐÅÏ¢Äþ¾²±£¼Ý»¤º½¡£
¹Ø×¢ÎÒÃÇ£º