CVE-2017-9772

Insufficient sanitisation in the OCaml compiler versions 4.04.0 and 4.04.1 allows external code to be executed with raised privilege in binaries marked as setuid, by setting the CAML_CPLUGINS, CAML_NATIVE_CPLUGINS, or CAML_BYTE_CPLUGINS environment variable.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ocaml:ocaml:4.04.0:*:*:*:*:*:*:*
cpe:2.3:a:ocaml:ocaml:4.04.1:*:*:*:*:*:*:*

History

21 Nov 2024, 03:36

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/99277 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/99277 - Third Party Advisory, VDB Entry
References () https://caml.inria.fr/mantis/view.php?id=7557 - Issue Tracking, Third Party Advisory () https://caml.inria.fr/mantis/view.php?id=7557 - Issue Tracking, Third Party Advisory
References () https://security.gentoo.org/glsa/201710-07 - () https://security.gentoo.org/glsa/201710-07 -
References () https://sympa.inria.fr/sympa/arc/caml-list/2017-06/msg00094.html - Issue Tracking, Third Party Advisory () https://sympa.inria.fr/sympa/arc/caml-list/2017-06/msg00094.html - Issue Tracking, Third Party Advisory

Information

Published : 2017-06-23 20:29

Updated : 2024-11-21 03:36


NVD link : CVE-2017-9772

Mitre link : CVE-2017-9772

CVE.ORG link : CVE-2017-9772


JSON object : View

Products Affected

ocaml

  • ocaml