CVE-2020-3566 | Cisco IOS-XRÎó²îͨ¸æ
Ðû²¼Ê±¼ä 2020-09-020x00 Îó²î¸ÅÊö
CVE ID | CVE-2020-3566 | ʱ ¼ä | 2020-09-02 |
Àà ÐÍ | DOS | µÈ ¼¶ | ¸ßΣ |
Ô¶³ÌʹÓà | ÊÇ | Ó°Ïì¹æÄ£ | ÆôÓÃDVMRP¹¦Ð§µÄIOS-XRϵÁÐËùÓа汾 |
Cisco¹«Ë¾ÓÚ2020Äê8ÔÂ29ÈÕ¹Ù·½Ðû²¼Îó²îÔ¤¾¯£¬£¬£¬£¬Cisco IOS-XRϵÁÐÖеľàÀëʸÁ¿¶à²¥Â·ÓÉÐÒ飨DVMRP£©±£´æÒ»¸öBug£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßʹÓôËbug£¬£¬£¬£¬µ¼ÖÂ×°±¸ÄÚ´æºÄ¾¡²¢Ê¹ÆäËüÀú³ÌÍ߽⣬£¬£¬£¬ÆäÎó²î±àºÅΪCVE-2020-3566¡£¡£¡£¡£¡£¡£¡£IOS-XRϵÁÐÖ÷ÒªÓÃÓÚÔËÓªÉ̺ÍÊý¾ÝÖÐÐÄ¡£¡£¡£¡£¡£¡£¡£
¸ÃÎó²îÊÇÓÉÓÚInternet×éÖÎÀíÐÒ飨IGMP£©Êý¾Ý°üµÄÐÐÁÐÖÎÀíȱ·¦ËùÖ¡£¡£¡£¡£¡£¡£¡£Ë¼¿Æ»¹Î´Ðû²¼´ËÈí¼þµÄÇå¾²¸üУ¬£¬£¬£¬Cisco²úÆ·Çå¾²ÊÂÎñÏìӦС×飨PSIRT£©ÓÚ2020Äê8ÔÂ28ÈÕ·¢Ã÷ÔÚÒ°ÍâÊÔͼʹÓôËÎó²îµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¡£
0x01 Îó²îÏêÇé

ÈôÊÇÎó²îµ¼ÖÂÄÚ´æºÄ¾¡£¬£¬£¬£¬Õâ¿ÉÄÜ»áÓ°ÏìÉè±¹ØÁ¬ÄÆäËüÀú³Ì¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿£¿ÉÒÔͨ¹ýʹÓÃprocess restart igmpÏÂÁîÖØÐÂÆô¶¯IGMPÀú³Ì£¬£¬£¬£¬¿ÉÒÔ»Ö¸´IGMPÀú³ÌÏûºÄµÄÄڴ棬£¬£¬£¬ÈçÏÂËùʾ£º
RP/0/0/CPU0:router# process restart igmp
ÈôÊÇIGMPÀú³Ì˲¼äÍ߽⣬£¬£¬£¬ÔòÎÞÐèÊÖ¶¯ÖØÐÂÆô¶¯IGMPÀú³Ì£¬£¬£¬£¬ÓÉÓÚϵͳÒѾִÐÐÁ˸òÙ×÷¡£¡£¡£¡£¡£¡£¡£ÕâÖÖ×Ô¶¯ÖØÆô½«»Ö¸´ÏûºÄµÄÄÚ´æ¡£¡£¡£¡£¡£¡£¡£
ÔÚ˼Á¿»º½â²½·¥Ê±£¬£¬£¬£¬¹ØÓÚÄÚ´æºÄí§Òâ¿ö£¬£¬£¬£¬ËÙÂÊÏÞÖÆºÍ»á¼û¿ØÖÆÒªÁìÊÇÓÐÓõġ£¡£¡£¡£¡£¡£¡£¹ØÓÚ˲¼ä±¬·¢IGMPÀú³ÌÍß½âµÄÇéÐΣ¬£¬£¬£¬Ö»Óлá¼û¿ØÖÆÒªÁìÓÐÓᣡ£¡£¡£¡£¡£¡£
µ±×°±¸ÄÚ´æºÄ¾¡Ê±£¬£¬£¬£¬ÔÚϵͳÈÕÖ¾ÖпÉÄܻῴµ½ÒÔÏÂÐÂÎÅ£º
RP/0/RSP1/CPU0:Aug 28 03:46:10.375 UTC: raw_ip[399]: %PKT_INFRA-PQMON-6-QUEUE_DROP : Taildrop on XIPC queue 1 owned by igmp (jid=1175)
RP/0/RSP0/CPU0:Aug 28 03:46:10.380 UTC: raw_ip[399]: %PKT_INFRA-PQMON-6-QUEUE_DROP : Taildrop on XIPC queue 1 owned by igmp (jid=1175)
RP/0/RSP0/CPU0:Aug 28 03:49:22.850 UTC: dumper[61]: %OS-DUMPER-7-DUMP_REQUEST : Dump request for process pkg/bin/igmp
RP/0/RSP0/CPU0:Aug 28 03:49:22.851 UTC: dumper[61]: %OS-DUMPER-7-DUMP_ATTRIBUTE : Dump request with attribute 7 for process pkg/bin/igmp
RP/0/RSP0/CPU0:Aug 28 03:49:22.851 UTC: dumper[61]: %OS-DUMPER-4-SIGSEGV : Thread 9 received SIGSEGV - Segmentation Fault
µ±×°±¸µÄIGMPÀú³ÌÍß½âʱ£¬£¬£¬£¬ÔÚϵͳÈÕÖ¾ÖпÉÄܻῴµ½ÒÔÏÂÐÂÎÅ£º
RP/0/RSP0/CPU0:Aug 30 17:21:47.653 UTC: igmp[1169]: %HA-HA_WD_LIB-4-RLIMIT : wd_handle_sigxfsz: Reached 90% of RLIMIT_DATA
RP/0/RSP0/CPU0:Aug 30 17:21:47.653 UTC: igmp[1169]: %ROUTING-IPV4_IGMP-4-OOM_STATE_THROTTLE : Received Critical memory depletion warning, stop creating new igmp state
RP/0/RSP1/CPU0:Aug 30 17:23:50.442 UTC: sysmgr[94]: igmp(1) (jid 1169) (pid 121667828) (fail_count 2) abnormally terminated, restart scheduled
0x02 ´¦Öóͷ£½¨Òé
ÏÖÔÚ¹Ù·½Î´Ðû²¼Çå¾²¸üС£¡£¡£¡£¡£¡£¡£
ÔÝʱ²½·¥£º
1.ÔËÐÐshow igmp interfaceÏÂÁîÅжÏ×°±¸ÉÏÊÇ·ñÆôÓÃÁ˶ಥ·ÓÉ¡£¡£¡£¡£¡£¡£¡£
ÈçͼËùʾ£º

ÈôÊÇÊä³öΪ¿Õ£¬£¬£¬£¬Ôò¸Ã×°±¸²»ÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£
2.ΪÁË»º½âÄÚ´æºÄ¾¡µÄÇéÐΣ¬£¬£¬£¬½¨ÒéʵÑéËÙÂÊÏÞÖÆ¡£¡£¡£¡£¡£¡£¡£ÕâÐèÒªÖªµÀÄ¿½ñµÄIGMPÁ÷Á¿£¬£¬£¬£¬²¢½«ÆäËÙÂÊÉèÖÃΪµÍÓÚÄ¿½ñµÄƽ¾ùËÙÂÊ¡£¡£¡£¡£¡£¡£¡£ÉèÖÃģʽÏÂÊäÈëlpts pifib hardware police flow igmp rateÏÂÁî¡£¡£¡£¡£¡£¡£¡£
ÈçÏÂËùʾ£º
RP/0/0/CPU0:router(config)# lpts pifib hardware police flow igmp rate
¸ÃÏÂÁî²»»áɾ³ýÎó²îʹÓõÄʸÁ¿¡£¡£¡£¡£¡£¡£¡£¿ÉÊǸÃÏÂÁ½µµÍͨѶÖÊÁ¿²¢ÔöÌíÀÖ³ÉʹÓÃËùÐèµÄʱ¼ä¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿£¿£¿ÉÒÔʹÓÃÕâ¶Îʱ¼äÀ´Ö´Ðлָ´²Ù×÷¡£¡£¡£¡£¡£¡£¡£
3.¸üлá¼û¿ØÖÆÁÐ±í£¨ACL£©£¬£¬£¬£¬ÒÔ»º½âÄÚ´æºÄí§Òâ¿öºÍ˲¼äIGMPÀú³ÌÍß½âÇéÐΡ£¡£¡£¡£¡£¡£¡£ÈçÏ£º
RP/0/0/CPU0:router(config)# ipv4 access-list deny igmp any any dvmrp
0x03 Ïà¹ØÐÂÎÅ
https://www.securezoo.com/2020/08/cisco-warns-of-ios-xr-zero-day-vulnerability-exploit-in-the-wild-cve-2020-3566/
https://www.zdnet.com/article/cisco-warns-of-actively-exploited-ios-xr-zero-day/
0x04 ²Î¿¼Á´½Ó
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dvmrp-memexh-dSmpdvfz
0x05 ʱ¼äÏß
2020-08-29 Cisco¹Ù·½Ðû²¼Ô¤¾¯
2020-09-02 VSRCÐû²¼Îó²îͨ¸æ



¾©¹«Íø°²±¸11010802024551ºÅ