19 Lalacewar Amfani da Nisa a cikin Tarin TCP/IP na Treck

A cikin tarin TCP/IP na mallakar mallaka tafiya bayyana 19 rauni, an yi amfani da su ta hanyar aikawa da fakiti na musamman. An sanya maƙasudin sunan lamba Ripple20. Wasu lahani kuma suna bayyana a cikin tarin KASAGO TCP/IP daga Zuken Elmic (Elmic Systems), wanda ke da tushen gama gari tare da Treck. Ana amfani da tari na Treck a yawancin masana'antu, likitanci, sadarwa, na'urorin da aka haɗa da na'urori masu amfani (daga fitilu masu kyau zuwa na'urori masu bugawa da kuma samar da wutar lantarki marar katsewa), da kuma makamashi, sufuri, jiragen sama, kasuwanci da kayan samar da mai.

19 Lalacewar Amfani da Nisa a cikin Tarin TCP/IP na Treck

Sanannen harin hari ta amfani da tarin TCP/IP na Treck sun haɗa da firintocin cibiyar sadarwa na HP da kwakwalwan kwamfuta na Intel. Daga cikin wasu abubuwa, matsaloli a cikin tarin Treck TCP/IP sun zama sanadin kwanan nan m vulnerabilities a cikin tsarin Intel AMT da ISM, ana sarrafa su ta hanyar aika fakitin cibiyar sadarwa. An tabbatar da kasancewar raunin da masana'antun Intel, HP, Hewlett Packard Enterprise, Baxter, Caterpillar, Digi, Rockwell Automation da Schneider Electric suka tabbatar. Kara
66 masana'antu, wanda samfuransa ke amfani da tarin Treck's TCP/IP, har yanzu ba su amsa matsalolin ba. Masana'antun 5, gami da AMD, sun bayyana cewa samfuran su ba su da sauƙi ga matsaloli.

19 Lalacewar Amfani da Nisa a cikin Tarin TCP/IP na Treck

An sami matsaloli a aiwatar da ka'idojin IPv4, IPv6, UDP, DNS, DHCP, TCP, ICMPv4 da ka'idojin ARP, kuma an haifar da su ta hanyar sarrafa ma'aunin girman bayanan da ba daidai ba (ta amfani da filin girman ba tare da duba ainihin girman bayanan ba), kurakurai a ciki. duba bayanan shigarwa, 'yantar da ƙwaƙwalwar ajiya sau biyu, karatun baya-baya, yawan adadin lamba, sarrafa shiga mara kuskure, da matsalolin sarrafa igiyoyin da ba su da iyaka.

Matsalolin biyu mafi haɗari (CVE-2020-11896, CVE-2020-11897), waɗanda aka sanya matakin CVSS 10, suna ba da damar yin amfani da lambar akan na'ura ta hanyar aika fakitin IPv4/UDP ko IPV6 na musamman. Matsala mai mahimmanci ta farko ta bayyana akan na'urori masu goyan bayan ramukan IPv4, kuma na biyu a cikin sigogin da aka saki kafin 04.06.2009/6/9 tare da tallafin IPv2020. Wani mummunan rauni (CVSS 11901) yana cikin mai warwarewar DNS (CVE-XNUMX-XNUMX) kuma yana ba da izinin aiwatar da lambar ta hanyar aika buƙatar DNS na musamman (an yi amfani da matsalar don nuna hacking na Schneider Electric APC UPS kuma ya bayyana akan na'urori tare da Taimakon DNS).

Sauran raunin CVE-2020-11898, CVE-2020-11899, CVE-2020-11902, CVE-2020-11903, CVE-2020-11905 ba da damar abubuwan da ke ciki na IPv4/ICMPv4, IPv6/ICMPv4, IPv6Over, ko DHCPv6Over ya bayyana. aika wuraren ƙwaƙwalwar ajiyar tsarin fakiti na musamman. Wasu matsalolin na iya haifar da ƙin sabis ko zubar da sauran bayanai daga masu buffer na tsarin.

Yawancin rashin lahani an daidaita su a cikin Treck 6.0.1.67 (CVE-2020-11897 an daidaita shi a cikin 5.0.1.35, CVE-2020-11900 a cikin 6.0.1.41, CVE-2020-11903 a cikin 6.0.1.28-2020 a cikin 11908-4.7.1.27 20. 6). Tun da shirye-shiryen sabunta firmware don takamaiman na'urori na iya jinkirta ko ba zai yiwu ba (Tsarin Treck ya kasance sama da shekaru 4, yawancin na'urori ba a kiyaye su ba ko kuma suna da wahalar sabuntawa), ana ba da shawarar masu gudanarwa don ware na'urori masu matsala da daidaita tsarin binciken fakiti, firewalls. ko masu ba da hanya don daidaitawa ko toshe fakitin rarrabuwa, toshe ramukan IP (IPv6-in-IPvXNUMX da IP-in-IP), toshe “tushen hanyar sadarwa”, ba da damar bincika zaɓuɓɓukan da ba daidai ba a cikin fakitin TCP, toshe saƙonnin sarrafa ICMP da ba a amfani da su (MTU Sabuntawa da Mask ɗin Adireshin), kashe IPVXNUMX multicast da kuma tura tambayoyin DNS zuwa amintaccen sabar DNS mai maimaitawa.


source: budenet.ru

Add a comment