CVE-2015-8869

OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 85%
VendorProductVersion
opensuseopensuse
13.2
ocamlocaml
𝑥
≤ 4.02.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ocaml
bullseye
4.11.1-4
fixed
jessie
no-dsa
bookworm
4.13.1-4
fixed
sid
5.2.0-3
fixed
trixie
5.2.0-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ocaml
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
not-affected
eoan
not-affected
disco
not-affected
cosmic
not-affected
bionic
not-affected
artful
ignored
zesty
ignored
yakkety
ignored
xenial
Fixed 4.02.3-5ubuntu2+esm1
released
wily
ignored
trusty
Fixed 4.01.0-3ubuntu3.1
released
precise
ignored
References