¡¾Îó²îͨ¸æ¡¿SLPЭÒé¾Ü¾ø·þÎñÎó²î£¨CVE-2023-29552£©

Ðû²¼Ê±¼ä 2023-04-26


Ò»¡¢Îó²î¸ÅÊö

CVE   ID

CVE-2023-29552

·¢Ã÷ʱ¼ä

2023-04-26

Àà    ÐÍ

Dos

µÈ    ¼¶

¸ßΣ

Ô¶³ÌʹÓÃ

ÊÇ

ËùÐèȨÏÞ


¹¥»÷ÖØÆ¯ºó

µÍ

Óû§½»»¥

·ñ

PoC/EXP


ÔÚҰʹÓÃ


 

·þÎñ¶¨Î»Ð­Ò飨Service Location Protocol  £¬Ëõд£ºSLP£©ÊÇÒ»ÖÖ·þÎñ·¢Ã÷ЭÒé  £¬ËüʹÅÌËã»ú»òÆäËü×°±¸¿ÉÒÔÔÚÎÞÐèÔ¤ÏÈÉèÖõÄÇéÐÎÏÂÔÚ¾ÖÓòÍøÖвéÕÒ·þÎñ×ÊÔ´  £¬Èç´òÓ¡»ú¡¢Îļþ·þÎñÆ÷ºÍÆäËüÍøÂç×ÊÔ´µÈ  £¬¸ÃЭÒéÔÚRFC 2608ÓëRFC 3224Öнç˵¡£

4ÔÂ25ÈÕ  £¬×ðÁú¿­Ê±VSRC¼à²âµ½Bitsight¹ûÕæÁË·þÎñ¶¨Î»Ð­Ò飨SLP£©ÖеÄÒ»¸ö¾Ü¾ø·þÎñÎó²î£¨CVE-2023-29552£©  £¬ÆäCVSSÆÀ·ÖΪ8.6¡£¸ÃÎó²î¿ÉÄܵ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³ÌÍþвÕßÔÚ SLP ·þÎñÆ÷ÉÏ×¢²áí§Òâ·þÎñ  £¬²¢Ê¹ÓÃÓÕÆ­ÐÔ UDP Á÷Á¿¶ÔÄ¿µÄÌᳫ·´ÉäÐÍ DoS ·Å´ó¹¥»÷¡£

ÐèÒª×¢ÖØµÄÊÇ  £¬ÍþвÕß¿ÉÒÔʹÓÃÊÜÓ°ÏìµÄSLPʵÀýÌᳫ¸ß´ï2200 ±¶µÄ´ó¹æÄ£¾Ü¾ø·þÎñ (DoS) ·Å´ó¹¥»÷  £¬Õâ¿ÉÄÜʹÆä³ÉΪÓÐÊ·ÒÔÀ´×î´óµÄ·Å´ó¹¥»÷Ö®Ò»  £¬²¢½«¶ÔÄ¿µÄÍøÂç»ò·þÎñÆ÷±¬·¢ÖØ´óÓ°Ïì¡£

ÏÖÔÚ  £¬»¥ÁªÍøÉϱ£´æÁè¼Ý2000¸ö×éÖ¯ÕýÔÚʹÓõÄ×°±¸Ì»Â¶ÁËԼĪ54000¸ö¿ÉʹÓõÄSLPʵÀý  £¬ÕâЩSLPʵÀý¿ÉÄܵ¼ÖÂDDoS·Å´ó¹¥»÷¡£Ò×Êܹ¥»÷µÄ·þÎñ°üÀ¨VMWare ESXi Hypervisor¡¢Konica Minolta ´òÓ¡»ú¡¢Planex ·ÓÉÆ÷¡¢IBM ¼¯³ÉÖÎÀíÄ £¿é (IMM)¡¢SMC IPMI ºÍ 665 ÖÖÆäËü²úÆ·ÀàÐÍ¡£×îÒ×Êܹ¥»÷µÄʵÀýλÓÚÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾¡¢µÂ¹ú¡¢¼ÓÄô󡢷¨¹ú¡¢Òâ´óÀû¡¢°ÍÎ÷¡¢ºÉÀ¼ºÍÎ÷°àÑÀ  £¬Éæ¼°ÊÖÒÕ¡¢µçÐÅ¡¢Ò½ÁƱ£½¡¡¢°ü¹Ü¡¢½ðÈÚ¡¢Âùݺͽ»Í¨µÈÐÐÒµ¡£

 

¶þ¡¢Ó°Ïì¹æÄ£

ËùÓÐÔÚ²»ÊÜÐÅÍеÄÍøÂ磨ÈçÖ±½ÓÅþÁ¬µ½ Internet µÄϵͳ£©ÉÏÔËÐеÄSLPʵÀý¡£

Ò×Êܹ¥»÷µÄ·þÎñ°üÀ¨£ºVMWare ESXi Hypervisor¡¢Konica Minolta ´òÓ¡»ú¡¢Planex ·ÓÉÆ÷¡¢IBM ¼¯³ÉÖÎÀíÄ £¿é (IMM)¡¢SMC IPMI ºÍ 665 ÖÖÆäËü²úÆ·ÀàÐÍ¡£

 

Èý¡¢Çå¾²²½·¥

3.1 Éý¼¶°æ±¾

ÏÖÔÚVMwareÒѾ­¶Ô¸ÃÎó²î×÷³öÏìÓ¦  £¬²¢È·ÈÏÄ¿½ñÖ§³ÖµÄ ESXi °æ±¾£¨ESXi 7.x ºÍ 8.x ϵÁУ©²»ÊÜÓ°Ïì  £¬µ«ÒѵִïÒ»Ñùƽ³£Ö§³ÖÖÕÖ¹ (EOGS) µÄ°æ±¾£¨ÀýÈç 6.7 ºÍ 6.5£©»áÊܵ½ CVE-2023-29552 µÄÓ°Ïì  £¬ÏêÇé¿É²Î¿¼£º

https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html

3.2 ÔÝʱ²½·¥

ÆóÒµ»ò×éÖ¯Ó¦ÔÚ̻¶ÓÚ»¥ÁªÍø»ò²»ÊÜÐÅÍÐÍøÂçµÄϵͳÉϽûÓÃSLP¡£

Èç²»¿É½ûÓÃSLP  £¬¿ÉÒÔÉèÖ÷À»ðǽÀ´¹ýÂËTCPºÍUDP¶Ë¿Ú427ÉϵÄÁ÷Á¿  £¬ÕâÊÇʹÓà SLP ·þÎñµÄ¶ñÒâÇëÇóµÄÖ÷ÒªÈë¿Ú¡£

3.3 ͨÓý¨Òé

l  °´ÆÚ¸üÐÂϵͳ²¹¶¡  £¬ïÔ̭ϵͳÎó²î  £¬ÌáÉý·þÎñÆ÷µÄÇå¾²ÐÔ¡£

l  ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ  £¬Ð޸ķÀ»ðǽսÂÔ  £¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ  £¬ïÔÌ­½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø  £¬ïÔÌ­¹¥»÷Ãæ¡£

l  ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·  £¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£

l  ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí  £¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔ­Ôò  £¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£

l  ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£

3.4 ²Î¿¼Á´½Ó

https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp

https://www.bleepingcomputer.com/news/security/new-slp-bug-can-lead-to-massive-2-200x-ddos-amplification-attacks/

 

ËÄ¡¢°æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

±¸×¢

V1.0

2023-04-26

Ê×´ÎÐû²¼

 

Îå¡¢¸½Â¼

5.1 ×ðÁú¿­Ê±¼ò½é

×ðÁú¿­Ê±½¨ÉèÓÚ1996Äê  £¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Çå¾²·þÎñ½â¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°×ðÁú¿­Ê±´óÏà  £¬¹«Ë¾Ô±¹¤6000ÓàÈË  £¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö  £¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´  £¬×ðÁú¿­Ê±ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ù·þÎñ  £¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ  £¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£

5.2 ¹ØÓÚ×ðÁú¿­Ê±

×ðÁú¿­Ê±Çå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯  £¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î  £¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£

¹Ø×¢ÎÒÃÇ£º

image.png