Treck TCP/IPÐÒé¿â¡°Ripple20¡±Îó²îͨ¸æÓë˵Ã÷
2020-06-30
Ò». Îó²î¸ÅÊö
¿ËÈÕ£¬ÒÔÉ«ÁÐÍøÂçÇå¾²¹«Ë¾JSOFµÄÑо¿Ö°Ô±ÔÚTreck¹«Ë¾¿ª·¢µÄµ×²ã TCP/IP Èí¼þ¿âÖз¢Ã÷ÁË19¸ö0dayÎó²î£¬°üÀ¨CVE-2020-11896¡¢CVE-2020-11897¡¢CVE-2020-11898¡¢CVE-2020-11899¡¢CVE-2020-11900¡¢CVE-2020-11901¡¢CVE-2020-11902¡¢CVE-2020-11903¡¢CVE-2020-11904¡¢CVE-2020-11905¡¢CVE-2020-11906¡¢CVE-2020-11907¡¢CVE-2020-11908¡¢CVE-2020-11909¡¢CVE-2020-11910¡¢CVE-2020-11911¡¢CVE-2020-11912¡¢CVE-2020-11913¡¢CVE-2020-11914¡£ÕâЩÎó²î±»JSOFÃüÃûΪ“Ripple20”¡£
Treck TCP/IPÊÇרÃÅΪǶÈëʽϵͳÉè¼ÆµÄ¸ßÐÔÄÜTCP/IPÐÒéÌ×¼þ£¬ÕâһϵÁÐÎó²î¶¼ÎªÄÚ´æËð»µÎÊÌ⣬ԴÓÚʹÓòî±ðÐÒ飨°üÀ¨IPv4£¬ICMPv4£¬IPv6£¬IPv6OverIPv4£¬TCP£¬UDP£¬ARP£¬DHCP£¬DNS»òÒÔÌ«ÍøÁ´Â·²ã£©ÔÚÍøÂçÉÏ·¢Ë͵ÄÊý¾Ý°üµÄ´¦Öóͷ£¹ýʧ¡£“Ripple20”Ó°ÏìÆÕ±éÁìÓòµÄÎïÁªÍø×°±¸£¬Éæ¼°HP¡¢Schneider Electric¡¢Cisco¡¢Rockwell Automation¡¢Caterpillar¡¢BaxterµÈÖڶ๩ӦÉÌ£¬¿ÉÄܵ¼ÖÂloT×°±¸Êܵ½¾Ü¾ø·þÎñºÍÔ¶³ÌÏÂÁîÖ´Ðеȹ¥»÷¡£
Îó²îÔÀíÆÊÎöÇë²ÎÔIJ©¿Í£º“Ripple20”Îó²îÀ´Ï®£¬AG¹«Ë¾¿Æ¼¼°ïÄã×öÆÊÎö
²Î¿¼Á´½Ó£º
https://treck.com/vulnerability-response-information
https://www.jsof-tech.com/ripple20
¶þ. Ó°Ïì¹æÄ£
ÊÜÓ°Ïì°æ±¾
l Treck TCP/IP = 6.0.1.66
l Treck TCP/IP = 6.0.1.41
l Treck TCP/IP = 6.0.1.28
l Treck TCP/IP = 5.0.1.35
l Treck TCP/IP = 4.7.1.27
²»ÊÜÓ°Ïì°æ±¾
l Treck TCP/IP >= 6.0.1.67
Èý. Îó²î¼ì²â
3.1 °æ±¾¼ì²â
¿Éͨ¹ýÕë¶Ô´úÂë×ʲú¾ÙÐк˲飬¿´ÊÇ·ñʹÓÃÁËTreckµÄÏà¹Ø´úÂ룬²¢´ÓÔ´´úÂëÖÐÉó²éÈí¼þ°æ±¾ÊÇ·ñÔÚÊÜÓ°Ïì¹æÄ£¡£
Õë¶Ô¶þ½øÖÆ¿âÎļþ£¬¿ÉÒÔʹÓÃÈçÏÂÏÂÁîÉó²é¿âÎļþµÄ°æ±¾£¬È·¶¨ÊÇ·ñʹÓÃÁËÊÜÓ°ÏìµÄ°æ±¾¡£
|
strings Çý¶¯Ãû³Æ | grep -e "[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}" |
3.2 ²úÆ·¼ì²â
3.2.1 Ô¶³ÌÇå¾²ÆÀ¹Àϵͳ£¨RSAS£©
AG¹«Ë¾¿Æ¼¼Ô¶³ÌÇå¾²ÆÀ¹Àϵͳ£¨RSAS£©ÒѾ߱¸Õë¶ÔTreckÐÒéµÄ¼ì²âÄÜÁ¦£¬ÇëÓа²ÅÅ×°±¸µÄÓû§Éý¼¶ÖÁ×îа汾ʹÓá£
|
|
Éý¼¶°ü°æ±¾ºÅ |
Éý¼¶°üÏÂÔØÁ´½Ó |
|
RSAS V6 ϵͳ²å¼þ°ü |
V6.0R02F01.1901 |
http://update.nsfocus.com/update/downloads/id/106109 |
¹ØÓÚRSASµÄÉèÖÃÖ¸µ¼£¬Çë²Î¿¼ÈçÏÂÁ´½Ó£º
https://mp.weixin.qq.com/s/aLAWXs5DgRhNHf4WHHhQyg
3.2.2 ÎïÁªÍø×¼ÈëÍø¹Ø
AG¹«Ë¾¿Æ¼¼ÎïÁªÍø×¼ÈëÍø¹Ø£¬¿ÉÒÔ¶ÔÎïÁªÍø×°±¸¾ÙÐÐ×Ô¶¯Ì½²â·¢Ã÷£¬ÐγÉÎïÁªÍø×°±¸×ʲú¿â£¬²¢ÄÜͨ¹ý¶ÔÁ÷Á¿¾ÙÐÐÆÊÎö£¬Ðγɹ¥»÷»Ïñ¡£
±¾´ÎÉý¼¶TreckÎó²îÖ¸ÎÆ¿âºó£¬¿ÉÒÔ×Ô¶¯Ì½²âÄÚÍøÊ¹ÓÃTreckÐÒéÕ»µÄÎïÁªÍø×°±¸£¬²¢¶ÔÕâÀà×°±¸±¬·¢¸æ¾¯¡£


Õë¶Ô·¢Ã÷ÓÐTreckÎó²îµÄ×°±¸£¬ÈôÊDZ¬·¢¹¥»÷ÐÐΪ£¬ÎïÁªÍø×¼ÈëÍø¹Ø£¬»¹¿ÉÒÔ¶Ô×°±¸¾ÙÐÐÍøÂç×è¶Ï¡£
3.3 ÍâµØ¹ØÁª¼ì²â
AG¹«Ë¾¿Æ¼¼ÍþвÇ鱨ÖÐÐĵÚһʱ¼äÊÕ¼ÁË´Ë´ÎÎó²îµÄÏêϸÐÅÏ¢£¬°üÀ¨Îó²î³ÉÒò¡¢ÊÜÓ°ÏìµÄ²úÆ·°æ±¾Ï¢Õù¾ö¼Æ»®µÈ¡£Îó²îCPE×ֶΰüÀ¨Á˿ɻú¶ÁµÄÓ°Ïì²úÆ·×ֶΣ¬¿ÉÒÔÓëÓû§ÍâµØ×ʲúÖÎÀí¿â¾ÙÐйØÁª£¬´Ó¶øÊ¶±ðÊÇ·ñ±£´æÓÐÓ°ÏìµÄ×°±¸¡£

ËÄ. Îó²î·À»¤
4.1 ¹Ù·½Éý¼¶
ÏÖÔÚ¹Ù·½ÒÑÔÚ×îа汾ÖÐÐÞ¸´Á˸ÃÎó²î£¬ÇëÏà¹ØÓû§ÅŲé»ùÓÚTreck¹«Ë¾TCP/IPÐÒéµÄ×°±¸Ê¹ÓÃÇéÐΣ¬²¢ÊµÊ±Éý¼¶ÖÁ6.0.1.67»ò¸ü¸ß°æ±¾¡£
4.2 ÆäËû·À»¤²½·¥
1¡¢ÔöÇ¿ÍøÂç»á¼û¿ØÖÆ£¬Õ¥È¡·ÇÐëҪװ±¸½ÓÈ뻥ÁªÍø¡£ÉèÖÃÍøÂçÇå¾²·À»¤Õ½ÂÔ£¬½öÆôÓÃÇå¾²µÄÔ¶³Ì»á¼û£¬½ûÓÃIPËíµÀºÍIPԴ·Óɹ¦Ð§¡¢Ç¿ÖÆÖ´ÐÐTCP¼ì²é¡¢×è¶ÏδʹÓõÄICMP¿ØÖÆÐÂÎŵȡ£Õë¶ÔÎïÁªÍø×°±¸£¬Õ¥È¡IP_IN_IPµÄ»á¼û·½·¨¡£
2¡¢Í¨¹ýÉî¶ÈÊý¾Ý°ü¼ì²é×èÖ¹Òì³£IPÁ÷Á¿£¬Ê¹ÓÃSuricata IDS×Ô½ç˵¹æÔò¼ì²âʹÓÃRipple20Îó²îµÄÒì³£IPÁ÷Á¿¡£
ÈôÊÇʹÓõķÀ»¤×°±¸¿ÉÒÔ×Ô½ç˵¹æÔò£¬Ôò¿ÉÌí¼ÓÈçϹæÔò¾ÙÐзÀ»¤£º
|
#IP-in-IP tunnel with fragments alert ip any any -> any any (msg:"VU#257161:CVE-2020-11896 Fragments inside IP-in-IP tunnel"; ip_proto:4; fragbits:M; rev:1;) |
¼ì²â¹æÔòÏÂÔØµØµã£ºhttps://github.com/CERTCC/PoC-Exploits/tree/master/vu-257161
3¡¢ÇëÏà¹ØÓû§¹Ø×¢ÎïÁªÍø×°±¸³§É̵ÄÈí¼þ¸üÐÂͨ¸æ£¬ÊµÊ±¸üÐÂϵͳµ½×îа汾¡£
Îå. AG¹«Ë¾Éæ¼°ÇéÐÎ˵Ã÷
¿ËÈÕ£¬ÔÚ»ñÈ¡µ½“Ripple20”Îó²îµÄÇéÐκó£¬ÎÒ˾¸ß¶ÈÖØÊÓ£¬µÚһʱ¼ä×éÖ¯Á˹«Ë¾¸÷²úÆ·Ïß¶ÔËùÊô²úÆ·¾ÙÐÐÅŲ顣¾Óɹ«Ë¾²úÆ·¡¢Ñз¢¡¢ÊÖÒÕÖ°Ô±µÄ¼ì²â£¬È·¶¨ÎÒ˾ËùÓвúÆ·²»ÊÜ“Ripple20”Îó²îÓ°Ïì£¬ÌØ´Ë˵Ã÷£¬Ñç¿Í»§¶¨ÐÄʹÓá£
AG¹«Ë¾¿Æ¼¼½«Ò»Á¬¸ú½ø“Ripple20”Îó²îµÄ×îж¯Ì¬£¬ÇëÄú¹Ø×¢AG¹«Ë¾¿Æ¼¼µÄ¹ÙÍø¡¢¹Ù΢µÄͨ¸æÄÚÈÝ¡£ÈôÓÐÎÊÌ⣬Äú¿ÉÒÔͨ¹ýÒÔÏ·½·¨ÁªÏµAG¹«Ë¾:
ÄúÒ²¿ÉÒÔͨ¹ý¹«Ë¾¹ÙÍø¾ÙÐÐÔÚÏß×Éѯ£º/html/6/61/169

AG¹«Ë¾ÔÆ







