| Title | Open Babel 3.1.1 / master commit 889c350 Heap-based Buffer Overflow |
|---|
| Description | Open Babel 3.1.1 (master commit 889c350) contains a heap-buffer-overflow vulnerability in the ChemKin format parser (ChemKinFormat::CheckSpecies). When parsing specially crafted ChemKin input, the function uses a corrupted or malformed string as a key for a std::map::find lookup. This can cause out-of-bounds memory access in the underlying red-black tree structure, leading to program crashes and denial of service. |
|---|
| Source | ⚠️ https://github.com/openbabel/openbabel/issues/2830 |
|---|
| User | ahuo (UID 90189) |
|---|
| Submission | 09/14/2025 10:04 (7 months ago) |
|---|
| Moderation | 09/25/2025 20:05 (11 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 325925 [Open Babel up to 3.1.1 chemkinformat.cpp CheckSpecies heap-based overflow] |
|---|
| Points | 20 |
|---|