【复现】Microsoft ICMP远程代码执行漏洞(CVE-2023-23415)风险通告
2023-3-15 08:3:19 Author: 赛博昆仑CERT(查看原文) 阅读量:1087 收藏

-赛博昆仑漏洞安全通告-

Internet Control Message Protocol (ICMP) 远程代码执行漏洞(CVE-2023-23415)风险通告

一、漏洞描述

Internet Control Message Protocol (ICMP) 协议是TCP/IP协议簇的一个子协议,用于在IP主机、路由器之间传递控制消息,Microsoft 在 Windows TCPIP 驱动程序中实现了对ICMP协议包的解析流程。
近日,赛博昆仑监测到Internet Control Message Protocol (ICMP) 远程代码执行的漏洞情报,该漏洞存在于处理tcpip协议栈中,在处理ICMP错误包的处理代码中存在一个内存漏洞。要触发此漏洞,攻击者需要向目标机器发送特制的ICMP数据包,同时目标上需要存在从原始套接字(Raw Socket)收取IP包的程序。
漏洞名称
Internet Control Message Protocol (ICMP) 远程代码执行漏洞
漏洞公开编号
CVE-2023-23415
昆仑漏洞库编号
CYKL-2023-002534
漏洞类型
RCE
公开时间
2023-03-15
漏洞等级
严重
评分
3.1
漏洞所需权限
无权限要求
漏洞利用难度
PoC状态
未知
EXP状态
未知
漏洞细节
未知
在野利用
未知
影响版本

向上滑动阅览

Windows 10 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 20H2 for 32-bit Systems

Windows 10 Version 20H2 for ARM64-based Systems

Windows 10 Version 20H2 for x64-based Systems

Windows 10 Version 21H2 for 32-bit Systems

Windows 10 Version 21H2 for ARM64-based Systems

Windows 10 Version 21H2 for x64-based Systems

Windows 10 Version 22H2 for 32-bit Systems

Windows 10 Version 22H2 for ARM64-based Systems

Windows 10 Version 22H2 for x64-based Systems

Windows 11 version 21H2 for ARM64-based Systems

Windows 11 version 21H2 for x64-based Systems

Windows 11 Version 22H2 for ARM64-based Systems

Windows 11 Version 22H2 for x64-based Systems

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

Windows Server 2012

Windows Server 2012 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 R2 (Server Core installation)

Windows Server 2016

Windows Server 2016 (Server Core installation)

Windows Server 2019

Windows Server 2019 (Server Core installation)

Windows Server 2022

Windows Server 2022 (Server Core installation)

二、漏洞复现
复现环境   
Windows 11 x64 22H2 22621.1344
复现详情

使用该 ICMP 漏洞实现 tcpip.sys 驱动远程崩溃:

三、修复建议

目前,官方已发布修复建议,建议受影响的用户尽快升级至安全版本。

四、技术咨询
赛博昆仑CERT已开启年订阅服务,付费客户(可申请试用)将获取更多技术详情,并支持适配客户的需求。

联系邮箱:[email protected]

公众号:赛博昆仑CERT

五、参考链接

  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23415
  • https://msrc.microsoft.com/update-guide/releaseNote/2023-Mar
六、时间线
2023年3月15日,微软官方发布安全通告
2023年3月15日,赛博昆仑CERT发布漏洞应急通告


文章来源: http://mp.weixin.qq.com/s?__biz=MzkxMDQyMTIzMA==&mid=2247483970&idx=2&sn=1a8a2c424feb05b5b18a6cbf552ccebb&chksm=c12affc3f65d76d585d21f1cd8ad2012eb69cb7fb0c39226bfcb819184a31c5d81380265e8ac#rd
如有侵权请联系:admin#unsafe.sh