¡¾·ì϶¹«¸æ¡¿SLPºÍ̸»Ø¾ø·þÎñ·ì϶£¨CVE-2023-29552£©

°ä²¼¹¦·ò 2023-04-26


Ò»¡¢·ì϶¸ÅÊö

CVE   ID

CVE-2023-29552

·¢ÏÖ¹¦·ò

2023-04-26

Àà    ÐÍ

Dos

µÈ    ¼¶

¸ßΣ

Ô¶³ÌÀûÓÃ

ÊÇ

ËùÐèȨÏÞ


¹¥»÷¸´ÔÓ¶È

µÍ

Óû§½»»¥

·ñ

PoC/EXP


ÔÚÒ°ÀûÓÃ


 

·þÎñ¶¨Î»ºÍ̸£¨Service Location Protocol £¬Ëõд£ºSLP£©ÊÇÒ»ÖÖ·þÎñ·¢ÏÖºÍ̸ £¬ËüÊ¹ÍÆËã»ú»òÆäËüÉ豸Äܹ»ÔÚÎÞÐèÔ¤ÏÈÉèÖõÄÇé¿öÏÂÔÚ¾ÖÓòÍøÖвéÕÒ·þÎñ×ÊÔ´ £¬Èç´òÓ¡»ú¡¢Îļþ·þÎñÆ÷ºÍÆäËüÍøÂç×ÊÔ´µÈ £¬¸ÃºÍ̸ÔÚRFC 2608ÓëRFC 3224Öнç˵¡£

4ÔÂ25ÈÕ £¬GA»Æ½ð¼×VSRC¼à²âµ½Bitsight¹«¿ªÁË·þÎñ¶¨Î»ºÍ̸£¨SLP£©ÖеÄÒ»¸ö»Ø¾ø·þÎñ·ì϶£¨CVE-2023-29552£© £¬ÆäCVSSÆÀ·ÖΪ8.6¡£¸Ã·ì϶¿ÉÄܵ¼ÖÂδ¾­Éí·ÝÑéÖ¤µÄÔ¶³ÌÍþвÕßÔÚ SLP ·þÎñÆ÷ÉÏ×¢²áËÁÒâ·þÎñ £¬²¢Ê¹ÓúýŪÐÔ UDP Á÷Á¿¶ÔÖ¸±êÌáÒé·´ÉäÐÍ DoS ·Å´ó¹¥»÷¡£

±ØÒª°ÑÎȵÄÊÇ £¬ÍþвÕßÄܹ»ÀûÓÃÊÜÓ°ÏìµÄSLPÊ·ýÌáÒé¸ß´ï2200 ±¶µÄ´ó¹æÄ£»Ø¾ø·þÎñ (DoS) ·Å´ó¹¥»÷ £¬Õâ¿ÉÄÜʹÆä³ÉΪÓÐÊ·ÒÔÀ´×î´óµÄ·Å´ó¹¥»÷Ö®Ò» £¬²¢½«¶ÔÖ¸±êÍøÂç»ò·þÎñÆ÷²úÉú³Á´óÓ°Ïì¡£

Ŀǰ £¬»¥ÁªÍøÉÏ´æÔÚ³¬¹ý2000¸ö×éÖ¯ÔÚʹÓõÄÉ豸¶³öÁËԼĪ54000¸ö¿ÉÀûÓõÄSLPÊ·ý £¬ÕâЩSLPÊ·ý¿ÉÄܵ¼ÖÂDDoS·Å´ó¹¥»÷¡£Ò×Êܹ¥»÷µÄ·þÎñÔ̺¬VMWare ESXi Hypervisor¡¢Konica Minolta ´òÓ¡»ú¡¢Planex ·ÓÉÆ÷¡¢IBM ¼¯³ÉÖÎÀíÄ£¿é (IMM)¡¢SMC IPMI ºÍ 665 ÖÔìäËü²úÆ·ÀàÐÍ¡£×îÒ×Êܹ¥»÷µÄÊ·ýλÓÚÃÀ¹ú¡¢Ó¢¹ú¡¢ÈÕ±¾¡¢µÂ¹ú¡¢¼ÓÄô󡢷¨¹ú¡¢Òâ´óÀû¡¢°ÍÎ÷¡¢ºÉÀ¼ºÍÎ÷°àÑÀ £¬Éæ¼°¼¼Êõ¡¢µçÐÅ¡¢Ò½ÁƱ£½¡¡¢±£ÏÕ¡¢½ðÈÚ¡¢¾ÆµêºÍ½»Í¨µÈÐÐÒµ¡£

 

¶þ¡¢Ó°ÏìÁìÓò

ËùÓÐÔÚ²»ÊÜÐÅÀµµÄÍøÂ磨ÈçÖ±½ÓÏνӵ½ Internet µÄϵͳ£©ÉÏÔËÐеÄSLPÊ·ý¡£

Ò×Êܹ¥»÷µÄ·þÎñÔ̺¬£ºVMWare ESXi Hypervisor¡¢Konica Minolta ´òÓ¡»ú¡¢Planex ·ÓÉÆ÷¡¢IBM ¼¯³ÉÖÎÀíÄ£¿é (IMM)¡¢SMC IPMI ºÍ 665 ÖÔìäËü²úÆ·ÀàÐÍ¡£

 

Èý¡¢°²È«´ëÊ©

3.1 Éý¼¶°æ±¾

ĿǰVMwareÒѾ­¶Ô¸Ã·ì϶×÷³öÏìÓ¦ £¬²¢È·Èϵ±Ç°Ö§³ÖµÄ ESXi °æ±¾£¨ESXi 7.x ºÍ 8.x ϵÁУ©²»ÊÜÓ°Ïì £¬µ«ÒѴﵽͨ³£Ö§³ÖÖÕÖ¹ (EOGS) µÄ°æ±¾£¨ÀýÈç 6.7 ºÍ 6.5£©»áÊܵ½ CVE-2023-29552 µÄÓ°Ïì £¬ÏêÇé¿É²Î¿¼£º

https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html

3.2 һʱ´ëÊ©

ÆóÒµ»ò×éÖ¯Ó¦ÔÚ¶³öÓÚ»¥ÁªÍø»ò²»ÊÜÐÅÀµÍøÂçµÄϵͳÉϽûÓÃSLP¡£

Èç²»ÄܽûÓÃSLP £¬Äܹ»ÅäÖ÷À»ðǽÀ´¹ýÂËTCPºÍUDP¶Ë¿Ú427ÉϵÄÁ÷Á¿ £¬ÕâÊÇÀûÓà SLP ·þÎñµÄ¶ñÒâÒªÇóµÄÖØÒªÈë¿Ú¡£

3.3 ͨÓý¨Òé

l  ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡ £¬Ï÷¼õϵͳ·ì϶ £¬ÌáÉý·þÎñÆ÷µÄ°²È«ÐÔ¡£

l  ¼ÓǿϵͳºÍÍøÂçµÄ½Ó¼û½ÚÔì £¬Åú¸Ä·À»ðǽսÊõ £¬¹Ø¹Ø·Ç±ØÒªµÄÀûÓö˿ڻò·þÎñ £¬Ï÷¼õ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Â¶³öµ½¹«Íø £¬Ï÷¼õ¹¥»÷Ãæ¡£

l  ʹÓÃÆóÒµ¼¶°²È«²úÆ· £¬ÌáÉýÆóÒµµÄÍøÂ簲ȫ»úÄÜ¡£

l  ¼ÓǿϵͳÓû§ºÍȨÏÞÖÎÀí £¬ÆôÓöà³É·ÖÈÏÖ¤»úÔìºÍ×îÓ×ȨÏÞ×¼Ôò £¬Óû§ºÍÈí¼þȨÏÞӦά³ÖÔÚ×îµÍÏÞ¶È¡£

l  ÆôÓÃÇ¿ÃÜÂëÕ½Êõ²¢ÉèÖÃΪ¶¨ÆÚÅú¸Ä¡£

3.4 ²Î¿¼Á´½Ó

https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp

https://www.bleepingcomputer.com/news/security/new-slp-bug-can-lead-to-massive-2-200x-ddos-amplification-attacks/

 

ËÄ¡¢°æ±¾ÐÅÏ¢

°æ±¾

ÈÕÆÚ

±¸×¢

V1.0

2023-04-26

³õ´Î°ä²¼

 

Îå¡¢¸½Â¼

5.1 GA»Æ½ð¼×¼ò½é

GA»Æ½ð¼×³ÉÁ¢ÓÚ1996Äê £¬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢Õ¼ÓÐÆëÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢°²È«¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢°²È«²úÆ·¡¢°²È«·þÎñ½â¾ö¹æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£

¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°GA»Æ½ð¼×´óÏà £¬¹«Ë¾Ô±¹¤6000ÓàÈË £¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊÓ×¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö £¬Õ¼Óи²¸ÇÈ«¹úµÄÏúÊÛϵͳ¡¢Çþ·ϵͳºÍ¼¼ÊõÖ§³Öϵͳ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐÓ×°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©

¶àÄêÀ´ £¬GA»Æ½ð¼×ÖÂÁ¦ÓÚÌṩӵÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´Ðµİ²È«²úÆ·ºÍ×î¼Ñʵ¼Ê·þÎñ £¬Ô®ÊÖ¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄ°²È«ÐԺͳö²úЧÁ¦ £¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢°²È«²úÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸ÖÂÁ¦¡£

5.2 ¹ØÓÚGA»Æ½ð¼×

GA»Æ½ð¼×°²È«Ó¦¼±ÏìÓ¦ÖÐÐÄÒѰ䲼1000¶à¸ö·ì϶¹«¸æÎ¢·çÏÕÔ¤¾¯ £¬ÎÒÃǽ«³ÖÐø¸ú×ÙÈ«Çò×îеÄÍøÂ簲ȫÊÂÎñºÍ·ì϶ £¬ÎªÆóÒµµÄÐÅÏ¢°²È«±£¼Ý»¤º½¡£

¹Ø×¢ÎÒÃÇ£º

image.png