CVE-2020-3566 | Cisco IOS-XRÎó²îͨ¸æ
Ðû²¼Ê±¼ä 2020-09-020x00 Îó²î¸ÅÊö
CVE ID | CVE-2020-3566 | ʱ ¼ä | 2020-09-02 |
Àà ÐÍ | DOS | µÈ ¼¶ | ¸ßΣ |
Ô¶³ÌʹÓà | ÊÇ | Ó°Ïì¹æÄ£ | ÆôÓÃDVMRP¹¦Ð§µÄIOS-XRϵÁÐËùÓа汾 |
Cisco¹«Ë¾ÓÚ2020Äê8ÔÂ29ÈÕ¹Ù·½Ðû²¼Îó²îÔ¤¾¯£¬£¬£¬£¬£¬Cisco IOS-XRϵÁÐÖеľàÀëʸÁ¿¶à²¥Â·ÓÉÐÒ飨DVMRP£©±£´æÒ»¸öBug£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßʹÓôËbug£¬£¬£¬£¬£¬µ¼ÖÂ×°±¸ÄÚ´æºÄ¾¡²¢Ê¹ÆäËüÀú³ÌÍ߽⣬£¬£¬£¬£¬ÆäÎó²î±àºÅΪCVE-2020-3566¡£¡£¡£¡£¡£IOS-XRϵÁÐÖ÷ÒªÓÃÓÚÔËÓªÉ̺ÍÊý¾ÝÖÐÐÄ¡£¡£¡£¡£¡£
¸ÃÎó²îÊÇÓÉÓÚInternet×éÖÎÀíÐÒ飨IGMP£©Êý¾Ý°üµÄÐÐÁÐÖÎÀíȱ·¦ËùÖ¡£¡£¡£¡£¡£Ë¼¿Æ»¹Î´Ðû²¼´ËÈí¼þµÄÇå¾²¸üУ¬£¬£¬£¬£¬Cisco²úÆ·Çå¾²ÊÂÎñÏìӦС×飨PSIRT£©ÓÚ2020Äê8ÔÂ28ÈÕ·¢Ã÷ÔÚÒ°ÍâÊÔͼʹÓôËÎó²îµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£
0x01 Îó²îÏêÇé
ÈôÊÇÎó²îµ¼ÖÂÄÚ´æºÄ¾¡£¡£¡£¡£¡£¬£¬£¬£¬£¬Õâ¿ÉÄÜ»áÓ°ÏìÉè±¹ØÁ¬ÄÆäËüÀú³Ì¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿ÉÒÔͨ¹ýʹÓÃprocess restart igmpÏÂÁîÖØÐÂÆô¶¯IGMPÀú³Ì£¬£¬£¬£¬£¬¿ÉÒÔ»Ö¸´IGMPÀú³ÌÏûºÄµÄÄڴ棬£¬£¬£¬£¬ÈçÏÂËùʾ£º
RP/0/0/CPU0:router# process restart igmp
ÈôÊÇIGMPÀú³Ì˲¼äÍ߽⣬£¬£¬£¬£¬ÔòÎÞÐèÊÖ¶¯ÖØÐÂÆô¶¯IGMPÀú³Ì£¬£¬£¬£¬£¬ÓÉÓÚϵͳÒѾִÐÐÁ˸òÙ×÷¡£¡£¡£¡£¡£ÕâÖÖ×Ô¶¯ÖØÆô½«»Ö¸´ÏûºÄµÄÄÚ´æ¡£¡£¡£¡£¡£
ÔÚ˼Á¿»º½â²½·¥Ê±£¬£¬£¬£¬£¬¹ØÓÚÄÚ´æºÄí§Òâ¿ö£¬£¬£¬£¬£¬ËÙÂÊÏÞÖÆºÍ»á¼û¿ØÖÆÒªÁìÊÇÓÐÓõġ£¡£¡£¡£¡£¹ØÓÚ˲¼ä±¬·¢IGMPÀú³ÌÍß½âµÄÇéÐΣ¬£¬£¬£¬£¬Ö»Óлá¼û¿ØÖÆÒªÁìÓÐÓᣡ£¡£¡£¡£
µ±×°±¸ÄÚ´æºÄ¾¡Ê±£¬£¬£¬£¬£¬ÔÚϵͳÈÕÖ¾ÖпÉÄܻῴµ½ÒÔÏÂÐÂÎÅ£º
RP/0/RSP1/CPU0:Aug 28 03:46:10.375 UTC: raw_ip[399]: %PKT_INFRA-PQMON-6-QUEUE_DROP : Taildrop on XIPC queue 1 owned by igmp (jid=1175)
RP/0/RSP0/CPU0:Aug 28 03:46:10.380 UTC: raw_ip[399]: %PKT_INFRA-PQMON-6-QUEUE_DROP : Taildrop on XIPC queue 1 owned by igmp (jid=1175)
RP/0/RSP0/CPU0:Aug 28 03:49:22.850 UTC: dumper[61]: %OS-DUMPER-7-DUMP_REQUEST : Dump request for process pkg/bin/igmp
RP/0/RSP0/CPU0:Aug 28 03:49:22.851 UTC: dumper[61]: %OS-DUMPER-7-DUMP_ATTRIBUTE : Dump request with attribute 7 for process pkg/bin/igmp
RP/0/RSP0/CPU0:Aug 28 03:49:22.851 UTC: dumper[61]: %OS-DUMPER-4-SIGSEGV : Thread 9 received SIGSEGV - Segmentation Fault
µ±×°±¸µÄIGMPÀú³ÌÍß½âʱ£¬£¬£¬£¬£¬ÔÚϵͳÈÕÖ¾ÖпÉÄܻῴµ½ÒÔÏÂÐÂÎÅ£º
RP/0/RSP0/CPU0:Aug 30 17:21:47.653 UTC: igmp[1169]: %HA-HA_WD_LIB-4-RLIMIT : wd_handle_sigxfsz: Reached 90% of RLIMIT_DATA
RP/0/RSP0/CPU0:Aug 30 17:21:47.653 UTC: igmp[1169]: %ROUTING-IPV4_IGMP-4-OOM_STATE_THROTTLE : Received Critical memory depletion warning, stop creating new igmp state
RP/0/RSP1/CPU0:Aug 30 17:23:50.442 UTC: sysmgr[94]: igmp(1) (jid 1169) (pid 121667828) (fail_count 2) abnormally terminated, restart scheduled
0x02 ´¦Öóͷ£½¨Òé
ÏÖÔÚ¹Ù·½Î´Ðû²¼Çå¾²¸üС£¡£¡£¡£¡£
ÔÝʱ²½·¥£º
1.ÔËÐÐshow igmp interfaceÏÂÁîÅжÏ×°±¸ÉÏÊÇ·ñÆôÓÃÁ˶ಥ·ÓÉ¡£¡£¡£¡£¡£
ÈçͼËùʾ£º
ÈôÊÇÊä³öΪ¿Õ£¬£¬£¬£¬£¬Ôò¸Ã×°±¸²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£
2.ΪÁË»º½âÄÚ´æºÄ¾¡µÄÇéÐΣ¬£¬£¬£¬£¬½¨ÒéʵÑéËÙÂÊÏÞÖÆ¡£¡£¡£¡£¡£ÕâÐèÒªÖªµÀÄ¿½ñµÄIGMPÁ÷Á¿£¬£¬£¬£¬£¬²¢½«ÆäËÙÂÊÉèÖÃΪµÍÓÚÄ¿½ñµÄƽ¾ùËÙÂÊ¡£¡£¡£¡£¡£ÉèÖÃģʽÏÂÊäÈëlpts pifib hardware police flow igmp rateÏÂÁî¡£¡£¡£¡£¡£
ÈçÏÂËùʾ£º
RP/0/0/CPU0:router(config)# lpts pifib hardware police flow igmp rate
¸ÃÏÂÁî²»»áɾ³ýÎó²îʹÓõÄʸÁ¿¡£¡£¡£¡£¡£¿ÉÊǸÃÏÂÁ½µµÍͨѶÖÊÁ¿²¢ÔöÌíÀÖ³ÉʹÓÃËùÐèµÄʱ¼ä¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿ÉÒÔʹÓÃÕâ¶Îʱ¼äÀ´Ö´Ðлָ´²Ù×÷¡£¡£¡£¡£¡£
3.¸üлá¼û¿ØÖÆÁÐ±í£¨ACL£©£¬£¬£¬£¬£¬ÒÔ»º½âÄÚ´æºÄí§Òâ¿öºÍ˲¼äIGMPÀú³ÌÍß½âÇéÐΡ£¡£¡£¡£¡£ÈçÏ£º
RP/0/0/CPU0:router(config)# ipv4 access-list deny igmp any any dvmrp
0x03 Ïà¹ØÐÂÎÅ
https://www.securezoo.com/2020/08/cisco-warns-of-ios-xr-zero-day-vulnerability-exploit-in-the-wild-cve-2020-3566/
https://www.zdnet.com/article/cisco-warns-of-actively-exploited-ios-xr-zero-day/
0x04 ²Î¿¼Á´½Ó
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dvmrp-memexh-dSmpdvfz
0x05 ʱ¼äÏß
2020-08-29 Cisco¹Ù·½Ðû²¼Ô¤¾¯
2020-09-02 VSRCÐû²¼Îó²îͨ¸æ