In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 03 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Title ocaml: OCaml: Remote code execution via buffer over-read in Marshal deserialization
Weaknesses CWE-125
References
Metrics threat_severity

None

threat_severity

Important


Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 04:15:00 +0000

Type Values Removed Values Added
Description In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.
First Time appeared Ocaml
Ocaml ocaml
Weaknesses CWE-126
CPEs cpe:2.3:a:ocaml:ocaml:*:*:*:*:*:*:*:*
Vendors & Products Ocaml
Ocaml ocaml
References
Metrics cvssV3_1

{'score': 7.9, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-02-27T15:49:06.382Z

Reserved: 2026-02-27T03:54:53.320Z

Link: CVE-2026-28364

cve-icon Vulnrichment

Updated: 2026-02-27T15:49:01.471Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T04:16:03.410

Modified: 2026-03-06T19:15:08.113

Link: CVE-2026-28364

cve-icon Redhat

Severity : Important

Publid Date: 2026-02-27T03:54:53Z

Links: CVE-2026-28364 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-02-27T09:02:51Z

Weaknesses