CVE-2015-8869

EUVD-2015-8725
OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 87%
Affected Products (NVD)
VendorProductVersion
opensuseopensuse
13.2
ocamlocaml
𝑥
≤ 4.02.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ocaml
bookworm
4.13.1-4
fixed
bullseye
4.11.1-4
fixed
jessie
no-dsa
sid
5.2.0-3
fixed
trixie
5.2.0-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ocaml
artful
ignored
bionic
not-affected
cosmic
not-affected
disco
not-affected
eoan
not-affected
focal
not-affected
groovy
not-affected
hirsute
not-affected
impish
not-affected
jammy
not-affected
precise
ignored
trusty
Fixed 4.01.0-3ubuntu3.1
released
wily
ignored
xenial
Fixed 4.02.3-5ubuntu2+esm1
released
yakkety
ignored
zesty
ignored
References