Description
OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-466-1 | ocaml security update |
EUVD |
EUVD-2015-8725 | OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function. |
Ubuntu USN |
USN-3437-1 | OCaml vulnerability |
Ubuntu USN |
USN-4778-1 | OCaml vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T08:29:22.141Z
Reserved: 2016-04-29T00:00:00.000Z
Link: CVE-2015-8869
No data.
Status : Modified
Published: 2016-06-13T19:59:01.317
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-8869
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN