In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 27 Feb 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data. | |
| First Time appeared |
Ocaml
Ocaml ocaml |
|
| Weaknesses | CWE-126 | |
| CPEs | cpe:2.3:a:ocaml:ocaml:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ocaml
Ocaml ocaml |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-27T03:58:04.453Z
Reserved: 2026-02-27T03:54:53.320Z
Link: CVE-2026-28364
No data.
Status : Received
Published: 2026-02-27T04:16:03.410
Modified: 2026-02-27T04:16:03.410
Link: CVE-2026-28364
No data.
OpenCVE Enrichment
No data.
Weaknesses