Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8869

Опубликовано: 13 июн. 2016
Источник: debian
EPSS Низкий

Описание

OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ocamlfixed4.02.3-9package
ocamlno-dsajessiepackage

Примечания

  • https://github.com/ocaml/ocaml/commit/659615c7b100a89eafe6253e7a5b9d84d0e8df74#diff-a97df53e3ebc59bb457191b496c90762

  • https://www.openwall.com/lists/oss-security/2016/04/29/1

  • Ocaml applications using the patched functions need to be recompiled with the

  • fixed ocaml version.

EPSS

Процентиль: 86%
0.02814
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
больше 9 лет назад

OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.

redhat
почти 10 лет назад

OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.

CVSS3: 9.1
nvd
больше 9 лет назад

OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.

suse-cvrf
больше 9 лет назад

Security update for ocaml

suse-cvrf
больше 9 лет назад

Security update for ocaml

EPSS

Процентиль: 86%
0.02814
Низкий