First published: Fri Jun 23 2017(Updated: )
Insufficient sanitisation in the OCaml compiler versions 4.04.0 and 4.04.1 allows external code to be executed with raised privilege in binaries marked as setuid, by setting the CAML_CPLUGINS, CAML_NATIVE_CPLUGINS, or CAML_BYTE_CPLUGINS environment variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE OCaml Runtime | =4.04.0 | |
SUSE OCaml Runtime | =4.04.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9772 has a high severity due to its potential for executing external code with elevated privileges in setuid binaries.
To fix CVE-2017-9772, upgrade to OCaml version 4.04.2 or later, which addresses the insufficient sanitization issue.
CVE-2017-9772 affects OCaml versions 4.04.0 and 4.04.1.
CVE-2017-9772 is a code execution vulnerability caused by insufficient sanitization in the OCaml compiler.
The risks of CVE-2017-9772 include unauthorized code execution and potential system compromise due to elevated privileges.