Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-28364

Опубликовано: 27 фев. 2026
Источник: redhat
CVSS3: 7.9
EPSS Низкий

Описание

In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.

A flaw was found in OCaml. A remote attacker could exploit a buffer over-read vulnerability during Marshal deserialization by providing specially crafted data. This issue stems from missing bounds validation in the readblock() function, which performs unbounded memory copy operations. Successful exploitation could lead to remote code execution.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10ocamlWill not fix
Red Hat Enterprise Linux 6ocamlAffected
Red Hat Enterprise Linux 7ocamlAffected
Red Hat Enterprise Linux 8ocamlWill not fix
Red Hat Enterprise Linux 9ocamlWill not fix

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=2443348ocaml: OCaml: Remote code execution via buffer over-read in Marshal deserialization

EPSS

Процентиль: 11%
0.00038
Низкий

7.9 High

CVSS3

Связанные уязвимости

CVSS3: 7.9
ubuntu
28 дней назад

In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.

CVSS3: 7.9
nvd
28 дней назад

In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.

CVSS3: 7.9
msrc
17 дней назад

In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.

CVSS3: 7.9
debian
28 дней назад

In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Mar ...

suse-cvrf
9 дней назад

Security update for ocaml

EPSS

Процентиль: 11%
0.00038
Низкий

7.9 High

CVSS3