[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2015-8869

Date: (C)2016-08-25   (M)2017-10-12
 
CVSS Score: 6.4Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 4.9Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: NONE
 Availability: PARTIAL











OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.

Reference:
BID-89318
FEDORA-2016-1c4e616564
GLSA-201702-15
RHSA-2016:1296
http://www.openwall.com/lists/oss-security/2016/04/29/6
http://www.openwall.com/lists/oss-security/2016/04/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
https://github.com/ocaml/ocaml/commit/659615c7b100a89eafe6253e7a5b9d84d0e8df74#diff-a97df53e3ebc59bb457191b496c90762
openSUSE-SU-2016:1335
openSUSE-SU-2016:2273

CPE    1
cpe:/o:novell:opensuse:13.2
CWE    1
CWE-119
OVAL    10
oval:org.secpod.oval:def:1501815
oval:org.secpod.oval:def:1501508
oval:org.secpod.oval:def:1501805
oval:org.secpod.oval:def:110538
...

© 2013 SecPod Technologies