Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 03 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | ocaml: OCaml: Remote code execution via buffer over-read in Marshal deserialization | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 27 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Feb 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data. | |
| First Time appeared |
Ocaml
Ocaml ocaml |
|
| Weaknesses | CWE-126 | |
| CPEs | cpe:2.3:a:ocaml:ocaml:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ocaml
Ocaml ocaml |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-27T15:49:06.382Z
Reserved: 2026-02-27T03:54:53.320Z
Link: CVE-2026-28364
Updated: 2026-02-27T15:49:01.471Z
Status : Analyzed
Published: 2026-02-27T04:16:03.410
Modified: 2026-03-06T19:15:08.113
Link: CVE-2026-28364
OpenCVE Enrichment
Updated: 2026-04-17T14:15:21Z