exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Oracle Secure Backup NDMP_CONECT_CLIENT_AUTH Overflow

Oracle Secure Backup NDMP_CONECT_CLIENT_AUTH Overflow
Posted Jan 16, 2009
Authored by Zhenhua Liu, XiaoPeng Zhang | Site fortinet.com

Fortinet has discovered a buffer overflow vulnerability in Oracle Secure Backup version through the use of a malformed NDMP packet.

tags | advisory, overflow
advisories | CVE-2008-5444
SHA-256 | f461073432a52de146dd8e73f0eb93223fafe750c8674ad039cbc777d157927e

Oracle Secure Backup NDMP_CONECT_CLIENT_AUTH Overflow

Change Mirror Download
Oracle Secure Backup NDMP_CONECT_CLIENT_AUTH Command Buffer Overflow Vulnerability

Fortinet's FortiGuard Global Security Research Team Discovers Vulnerability in Oracle Secure Backup


A Buffer Overflow vulnerability exists Oracle Secure Backup through a malformed NDMP packet.


Remote Code Execution


Critical (Base Score:10.0)

Affected Software:

Oracle Secure Backup

Additional Information:

Sending a malformed NDMP client authentication(NDMP_CONECT_CLIENT_AUTH Command) packet will cause a overflow a buffer overflow due to
invalid bounds checking.


Use the solution provided by Oracle http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html

The FortiGuard Global Security Research Team released a signature "Oracle.NDMP.CONNECT.CLIENT.AUTH.User.ID.Buffer.Overflow" on Jan 13 2009, which covers
this specific vulnerability.

Fortinet customers who subscribe to Fortinet¡¯s intrusion prevention (IPS) service should be protected against this Remote Code Execution Vulnerability. Fortinet¡¯s IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by the FortiGuard Global Security Research Team, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle.


Zhenhualiu and XiaopengZhang of Fortinet's FortiGuard Global Security Research Team



CVE ID: CVE-2008-5444

*** This email and any attachments thereto may contain private, confidential, and privileged material for the sole use of the intended recipient. Any review, copying, or distribution of this email (or any attachments thereto) by others is strictly prohibited. If you are not the intended recipient, please contact the sender immediately and permanently delete the original and any copies of this email and any attachments thereto. ***
Login or Register to add favorites

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By