CVE-2017-9772
Published: 23 June 2017
Insufficient sanitisation in the OCaml compiler versions 4.04.0 and 4.04.1 allows external code to be executed with raised privilege in binaries marked as setuid, by setting the CAML_CPLUGINS, CAML_NATIVE_CPLUGINS, or CAML_BYTE_CPLUGINS environment variable.
Notes
Author | Note |
---|---|
seth-arnold | Look for further modifications that would handle filesystem capabilities or other reasons for `AT_SECURE` to be set in getauxval(3). |
mdeslaur | only affects 4.04.0 and 4.04.1 |
Priority
Status
Package | Release | Status |
---|---|---|
ocaml Launchpad, Ubuntu, Debian |
artful |
Ignored
(end of life)
|
bionic |
Not vulnerable
(4.05.0-10ubuntu1)
|
|
cosmic |
Not vulnerable
(4.05.0-10ubuntu1)
|
|
disco |
Not vulnerable
(4.05.0-10ubuntu1)
|
|
trusty |
Not vulnerable
(4.01.0-3ubuntu3)
|
|
upstream |
Released
(4.04.2)
|
|
xenial |
Not vulnerable
(4.02.3-5ubuntu2)
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Not vulnerable
(4.02.3-6ubuntu2)
|
|
Patches: upstream: https://github.com/ocaml/ocaml/commit/38e2cd6a580e5b14a503f34d5ca7709d190c36a3 upstream: https://github.com/ocaml/ocaml/commit/bd801361f855017a2fb13435e218bc7fbbaf0896 upstream: https://github.com/ocaml/ocaml/commit/850021c200c7507f2a928a66fa1291ff4ae3a622 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |