Oracle.NDMP.CONNECT.CLIENT.AUTH.User.ID.Buffer.Overflow
Description
This indicates a possible attempt to exploit a buffer-overflow vulnerability in Oracle Secure Backup.
The vulnerability is located in obndmpd.exe while handling malformed NDMP_CONNECT_CLIENT_AUTH commands. It may allow remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts will likely cause the program to crash, resulting in a denial-of-service condition.
Affected Products
Oracle Secure Backup 10.2
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Refer to the vendor's web site for the suggested workaround:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |