Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
Date: Sat Jun 13 2009 - 09:54:12 CDT
Credit: Mike Cyr, aka h00die
Vulnerable: 220.127.116.11 (ddwrt version) but more than likely all versions
Discussion: Link Logger is a program for logging, analysis and reporting of router traffic so you can easily spot attacks and abuses on your network. By sending a ton of spoofed traffic, the syslogd portion of link logger will become overwhelmed and crash. The program must be restarted to bring syslogd back up. After talking with the vendor, the syslogd portion is from another company, so other products may also be vulnerable. The vendor would not disclose who the syslogd vendor was.
#Vendor notification 4/13/09
#Vendor acknowledgement 4/14/09, the syslogd is actually from another company, vendor contacts syslogd vendor.
#Vendor can not run DoS code successfully 5/11/09
#Sent instructions and video on how to install all needed modules and run successfully 5/12/09
#Asked for update, no response 6/8/09
#Sent to milw0rm and security focus 6/13/09
I will update this post when the code gets put on milw0rm.