In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.
History

Tue, 03 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Title ocaml: OCaml: Remote code execution via buffer over-read in Marshal deserialization
Weaknesses CWE-125
References
Metrics threat_severity

None

threat_severity

Important


Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 04:15:00 +0000

Type Values Removed Values Added
Description In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.
First Time appeared Ocaml
Ocaml ocaml
Weaknesses CWE-126
CPEs cpe:2.3:a:ocaml:ocaml:*:*:*:*:*:*:*:*
Vendors & Products Ocaml
Ocaml ocaml
References
Metrics cvssV3_1

{'score': 7.9, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-02-27T03:54:53.458Z

Updated: 2026-02-27T15:49:06.382Z

Reserved: 2026-02-27T03:54:53.320Z

Link: CVE-2026-28364

cve-icon Vulnrichment

Updated: 2026-02-27T15:49:01.471Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-27T04:16:03.410

Modified: 2026-02-27T14:06:37.987

Link: CVE-2026-28364

cve-icon Redhat

Severity : Important

Publid Date: 2026-02-27T03:54:53Z

Links: CVE-2026-28364 - Bugzilla