First published: Mon May 02 2016(Updated: )
OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ocaml | <4.03.0 | 4.03.0 |
Fedora | =24 | |
SUSE Linux | =13.2 | |
SUSE OCaml Runtime | <=4.02.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8869 has been classified as a critical vulnerability due to its potential for remote exploitation and buffer overflow attacks.
To mitigate CVE-2015-8869, upgrade OCaml to version 4.03.0 or later.
OCaml versions 4.02.3 and earlier are affected by CVE-2015-8869.
CVE-2015-8869 can facilitate buffer overflow attacks which may lead to remote code execution or information disclosure.
CVE-2015-8869 is particularly a concern on 64-bit platforms running affected OCaml versions.