Submit #654059: Open Babel 3.1.1 / master commit 889c3501 Memory Corruptioninfo

TitelOpen Babel 3.1.1 / master commit 889c3501 Memory Corruption
BeschreibungOpen Babel 3.1.1 (and the current master branch at commit 889c350) contains a vulnerability in the ZIP stream handling code (zipstreamimpl.h). When parsing certain compressed input files, the function zlib_stream::basic_unzip_streambuf<char>::underflow() invokes memcpy with overlapping source and destination buffers. Since memcpy is undefined for overlapping memory regions, this results in undefined behavior and can lead to memory corruption or a crash. A crafted input file can reliably trigger this condition, leading to denial-of-service and potentially opening the door for more severe memory corruption exploits.
Quelle⚠️ https://github.com/openbabel/openbabel/issues/2832
Benutzer ahuo (UID 90189)
Einreichung14.09.2025 10:01 (vor 7 Monaten)
Moderieren25.09.2025 20:05 (11 days later)
StatusAkzeptiert
VulDB Eintrag325923 [Open Babel bis 3.1.1 /src/zipstreamimpl.h underflow Pufferüberlauf]
Punkte20

Do you want to use VulDB in your project?

Use the official API to access entries easily!