Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8869

Опубликовано: 13 июн. 2016
Источник: debian
EPSS Низкий

Описание

OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ocamlfixed4.02.3-9package
ocamlno-dsajessiepackage

Примечания

  • https://github.com/ocaml/ocaml/commit/659615c7b100a89eafe6253e7a5b9d84d0e8df74#diff-a97df53e3ebc59bb457191b496c90762

  • https://www.openwall.com/lists/oss-security/2016/04/29/1

  • Ocaml applications using the patched functions need to be recompiled with the

  • fixed ocaml version.

EPSS

Процентиль: 85%
0.02777
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 9 лет назад

OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.

redhat
больше 9 лет назад

OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.

CVSS3: 9.1
nvd
около 9 лет назад

OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.

suse-cvrf
почти 9 лет назад

Security update for ocaml

suse-cvrf
около 9 лет назад

Security update for ocaml

EPSS

Процентиль: 85%
0.02777
Низкий