¡¾Îó²îͨ¸æ¡¿SLPÐÒé¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2023-29552£©
Ðû²¼Ê±¼ä 2023-04-26Ò»¡¢Îó²î¸ÅÊö
CVE ID | CVE-2023-29552 | ·¢Ã÷ʱ¼ä | 2023-04-26 |
Àà ÐÍ | Dos | µÈ ¼¶ | ¸ßΣ |
Ô¶³ÌʹÓà | ÊÇ | ËùÐèȨÏÞ | |
¹¥»÷ÖØÆ¯ºó | µÍ | Óû§½»»¥ | ·ñ |
PoC/EXP | ÔÚҰʹÓà |
ЧÀͶ¨Î»ÐÒ飨Service Location Protocol£¬£¬£¬Ëõд£ºSLP£©ÊÇÒ»ÖÖЧÀÍ·¢Ã÷ÐÒ飬£¬£¬ËüʹÅÌËã»ú»òÆäËü×°±¸¿ÉÒÔÔÚÎÞÐèÔ¤ÏÈÉèÖõÄÇéÐÎÏÂÔÚ¾ÖÓòÍøÖвéÕÒЧÀÍ×ÊÔ´£¬£¬£¬Èç´òÓ¡»ú¡¢ÎļþЧÀÍÆ÷ºÍÆäËüÍøÂç×ÊÔ´µÈ£¬£¬£¬¸ÃÐÒéÔÚRFC 2608ÓëRFC 3224Öнç˵¡£¡£¡£
4ÔÂ25ÈÕ£¬£¬£¬¼øºÚµ£±£ÍøVSRC¼à²âµ½Bitsight¹ûÕæÁËЧÀͶ¨Î»ÐÒ飨SLP£©ÖеÄÒ»¸ö¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2023-29552£©£¬£¬£¬ÆäCVSSÆÀ·ÖΪ8.6¡£¡£¡£¸ÃÎó²î¿ÉÄܵ¼ÖÂδ¾Éí·ÝÑéÖ¤µÄÔ¶³ÌÍþвÕßÔÚ SLP ЧÀÍÆ÷ÉÏ×¢²áí§ÒâЧÀÍ£¬£¬£¬²¢Ê¹ÓÃÓÕÆÐÔ UDP Á÷Á¿¶ÔÄ¿µÄÌᳫ·´ÉäÐÍ DoS ·Å´ó¹¥»÷¡£¡£¡£
ÐèÒª×¢ÖØµÄÊÇ£¬£¬£¬ÍþвÕß¿ÉÒÔʹÓÃÊÜÓ°ÏìµÄSLPʵÀýÌᳫ¸ß´ï2200 ±¶µÄ´ó¹æÄ£¾Ü¾øÐ§ÀÍ (DoS) ·Å´ó¹¥»÷£¬£¬£¬Õâ¿ÉÄÜʹÆä³ÉΪÓÐÊ·ÒÔÀ´×î´óµÄ·Å´ó¹¥»÷Ö®Ò»£¬£¬£¬²¢½«¶ÔÄ¿µÄÍøÂç»òЧÀÍÆ÷±¬·¢ÖØ´óÓ°Ïì¡£¡£¡£
ÏÖÔÚ£¬£¬£¬»¥ÁªÍøÉϱ£´æÁè¼Ý2000¸ö×éÖ¯ÕýÔÚʹÓõÄ×°±¸Ì»Â¶ÁËԼĪ54000¸ö¿ÉʹÓõÄSLPʵÀý£¬£¬£¬ÕâЩSLPʵÀý¿ÉÄܵ¼ÖÂDDoS·Å´ó¹¥»÷¡£¡£¡£Ò×Êܹ¥»÷µÄЧÀͰüÀ¨VMWare ESXi Hypervisor¡¢Konica Minolta ´òÓ¡»ú¡¢Planex ·ÓÉÆ÷¡¢IBM ¼¯³ÉÖÎÀíÄ£¿£¿£¿£¿é (IMM)¡¢SMC IPMI ºÍ 665 ÖÖÆäËü²úÆ·ÀàÐÍ¡£¡£¡£×îÒ×Êܹ¥»÷µÄʵÀýλÓÚÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾¡¢µÂ¹ú¡¢¼ÓÄô󡢷¨¹ú¡¢Òâ´óÀû¡¢°ÍÎ÷¡¢ºÉÀ¼ºÍÎ÷°àÑÀ£¬£¬£¬Éæ¼°ÊÖÒÕ¡¢µçÐÅ¡¢Ò½ÁƱ£½¡¡¢°ü¹Ü¡¢½ðÈÚ¡¢Âùݺͽ»Í¨µÈÐÐÒµ¡£¡£¡£
¶þ¡¢Ó°Ïì¹æÄ£
ËùÓÐÔÚ²»ÊÜÐÅÈεÄÍøÂ磨ÈçÖ±½ÓÅþÁ¬µ½ Internet µÄϵͳ£©ÉÏÔËÐеÄSLPʵÀý¡£¡£¡£
Ò×Êܹ¥»÷µÄЧÀͰüÀ¨£ºVMWare ESXi Hypervisor¡¢Konica Minolta ´òÓ¡»ú¡¢Planex ·ÓÉÆ÷¡¢IBM ¼¯³ÉÖÎÀíÄ£¿£¿£¿£¿é (IMM)¡¢SMC IPMI ºÍ 665 ÖÖÆäËü²úÆ·ÀàÐÍ¡£¡£¡£
Èý¡¢Çå¾²²½·¥
3.1 Éý¼¶°æ±¾
ÏÖÔÚVMwareÒѾ¶Ô¸ÃÎó²î×÷³öÏìÓ¦£¬£¬£¬²¢È·ÈÏÄ¿½ñÖ§³ÖµÄ ESXi °æ±¾£¨ESXi 7.x ºÍ 8.x ϵÁУ©²»ÊÜÓ°Ï죬£¬£¬µ«ÒѵִïÒ»Ñùƽ³£Ö§³ÖÖÕÖ¹ (EOGS) µÄ°æ±¾£¨ÀýÈç 6.7 ºÍ 6.5£©»áÊܵ½ CVE-2023-29552 µÄÓ°Ï죬£¬£¬ÏêÇé¿É²Î¿¼£º
https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html
3.2 ÔÝʱ²½·¥
ÆóÒµ»ò×éÖ¯Ó¦ÔÚ̻¶ÓÚ»¥ÁªÍø»ò²»ÊÜÐÅÈÎÍøÂçµÄϵͳÉϽûÓÃSLP¡£¡£¡£
Èç²»¿É½ûÓÃSLP£¬£¬£¬¿ÉÒÔÉèÖ÷À»ðǽÀ´¹ýÂËTCPºÍUDP¶Ë¿Ú427ÉϵÄÁ÷Á¿£¬£¬£¬ÕâÊÇʹÓà SLP ЧÀ͵ĶñÒâÇëÇóµÄÖ÷ÒªÈë¿Ú¡£¡£¡£
3.3 ͨÓý¨Òé
l °´ÆÚ¸üÐÂϵͳ²¹¶¡£¬£¬£¬ïÔÌϵͳÎó²î£¬£¬£¬ÌáÉýЧÀÍÆ÷µÄÇå¾²ÐÔ¡£¡£¡£
l ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬£¬£¬Ð޸ķÀ»ðǽսÂÔ£¬£¬£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻòЧÀÍ£¬£¬£¬ïÔ̽«Î£ÏÕЧÀÍ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬£¬£¬ïÔ̹¥»÷Ãæ¡£¡£¡£
l ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬£¬£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£¡£¡£
l ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬£¬£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬£¬£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏÞ¶È¡£¡£¡£
l ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£¡£¡£
3.4 ²Î¿¼Á´½Ó
https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp
https://www.bleepingcomputer.com/news/security/new-slp-bug-can-lead-to-massive-2-200x-ddos-amplification-attacks/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2023-04-26 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 ¼øºÚµ£±£Íø¼ò½é
¼øºÚµ£±£Íø½¨ÉèÓÚ1996Ä꣬£¬£¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£¡£¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Ç徲ЧÀͽâ¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£¡£¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¼øºÚµ£±£Íø´óÏ㬣¬£¬¹«Ë¾Ô±¹¤6000ÓàÈË£¬£¬£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕЧÀÍÍŶÓ1300ÓàÈË¡£¡£¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬£¬£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¡£¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС£¡£¡££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬£¬£¬¼øºÚµ£±£ÍøÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ùЧÀÍ£¬£¬£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬£¬£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Æð¾¢¡£¡£¡£
5.2 ¹ØÓÚ¼øºÚµ£±£Íø
¼øºÚµ£±£ÍøÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬£¬£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬£¬£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£¡£¡£
¹Ø×¢ÎÒÃÇ£º