[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-8869Date: (C)2016-08-25   (M)2023-12-22


OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 9.1CVSS Score : 6.4
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 5.2Impact Score: 4.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: PARTIAL
Integrity: NONE 
Availability: HIGH 
  
Reference:
BID-89318
FEDORA-2016-1c4e616564
GLSA-201702-15
RHSA-2016:1296
RHSA-2016:2576
RHSA-2017:0564
RHSA-2017:0565
http://www.openwall.com/lists/oss-security/2016/04/29/6
http://www.openwall.com/lists/oss-security/2016/04/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
https://github.com/ocaml/ocaml/commit/659615c7b100a89eafe6253e7a5b9d84d0e8df74#diff-a97df53e3ebc59bb457191b496c90762
openSUSE-SU-2016:1335
openSUSE-SU-2016:2273

CPE    2
cpe:/a:ocaml:ocaml
cpe:/o:fedoraproject:fedora:24
CWE    1
CWE-119
OVAL    13
oval:org.secpod.oval:def:110538
oval:org.secpod.oval:def:204154
oval:org.secpod.oval:def:203959
oval:org.secpod.oval:def:703834
...

© SecPod Technologies