CVE-2015-8869

OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
Configurations

Configuration 1 (hide)

cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:ocaml:ocaml:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-06-13 19:59

Updated : 2023-12-10 11:46


NVD link : CVE-2015-8869

Mitre link : CVE-2015-8869

CVE.ORG link : CVE-2015-8869


JSON object : View

Products Affected

opensuse

  • opensuse

ocaml

  • ocaml

fedoraproject

  • fedora
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor