The caml_ba_deserialize function in byterun/bigarray.c in the standard library in OCaml 4.06.0 has an integer overflow which, in situations where marshalled data is accepted from an untrusted source, allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted object.
References
Link | Resource |
---|---|
https://caml.inria.fr/mantis/view.php?id=7765 | Issue Tracking Vendor Advisory |
https://security.gentoo.org/glsa/202007-48 | |
https://caml.inria.fr/mantis/view.php?id=7765 | Issue Tracking Vendor Advisory |
https://security.gentoo.org/glsa/202007-48 |
Configurations
History
21 Nov 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://caml.inria.fr/mantis/view.php?id=7765 - Issue Tracking, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/202007-48 - |
Information
Published : 2018-04-06 18:29
Updated : 2024-11-21 04:15
NVD link : CVE-2018-9838
Mitre link : CVE-2018-9838
CVE.ORG link : CVE-2018-9838
JSON object : View
Products Affected
ocaml
- ocaml
CWE
CWE-190
Integer Overflow or Wraparound