| Título | Open Babel 3.1.1 / master commit 889c350 Heap-based Buffer Overflow |
|---|
| Descripción | Open Babel 3.1.1 (master commit 889c350) contains a heap-buffer-overflow vulnerability in the ChemKin format parser (ChemKinFormat::CheckSpecies). When parsing specially crafted ChemKin input, the function uses a corrupted or malformed string as a key for a std::map::find lookup. This can cause out-of-bounds memory access in the underlying red-black tree structure, leading to program crashes and denial of service. |
|---|
| Fuente | ⚠️ https://github.com/openbabel/openbabel/issues/2830 |
|---|
| Usuario | ahuo (UID 90189) |
|---|
| Sumisión | 2025-09-14 10:04 (hace 7 meses) |
|---|
| Moderación | 2025-09-25 20:05 (11 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 325925 [Open Babel hasta 3.1.1 chemkinformat.cpp CheckSpecies desbordamiento de búfer] |
|---|
| Puntos | 20 |
|---|