PRL-2012-05

#####################################################################################

Application:   Network Instrument Observer SNMP SetRequest Denial of Service Vulnerability

Platforms:   Windows

Secunia:   SA47898

{PRL}:   2012-05

Author:   Francis Provencher (Protek Research Lab’s)

Website:   http://www.protekresearchlab.com/

Twitter:   @ProtekResearch

#####################################################################################

1) Introduction
2) Report Timeline
3) Technical details
4) The Code

#####################################################################################

===============
1) Introduction
===============

Network Instruments develops software and hardware solutions for analyzing and managing network

and application performance, such as network analyzers. They were founded in 1994, and are headquartered

in Minneapolis, Minnesota. The mainstay product of Network Instruments is its Observer family of network

analyzers (including Observer, Observer Expert and Observer Suite). The Observer product family was built for

real-time analysis, monitoring, and reporting of full-duplex network links in environments including local area networks

(LAN), wireless, Fibre Channel, Wide Area Networks, gigabit Ethernet, and Full duplex 10 GbE
(http://en.wikipedia.org/wiki/Network_Instruments)

#####################################################################################

============================
2) Report Timeline
============================

2012-02-07  Vulnerability reported to Secunia
2012-03-12  Vendor disclose patch

#####################################################################################

============================
3) Technical details
============================

The vulnerability is caused due to a NULL-pointer dereference error when copying an octet string from

a variable binding list. This can be exploited to cause a crash via a specially crafted SNMP SetRequest PDU

sent to UDP port 162.

#####################################################################################

===========
4) The Code
===========

Here

###############################################################################