Critical CVE-2022-46292 in Open Babel versions 3.1.1 & master commit 530dbfa3 allows arbitrary code execution. Impact severity: High. Learn about affected systems, versions & mitigation.
Open Babel version 3.1.1 and master commit 530dbfa3 are affected by multiple out-of-bounds write vulnerabilities in the translationVectors parsing functionality, allowing arbitrary code execution via specially-crafted files. This vulnerability impacts the MOPAC file format.
Understanding CVE-2022-46292
Open Babel, a chemical toolbox designed to speak the many languages of chemical data, has been discovered to have critical vulnerabilities that can be exploited by attackers to execute arbitrary code.
What is CVE-2022-46292?
Open Babel versions 3.1.1 and master commit 530dbfa3 are susceptible to multiple out-of-bounds write flaws in the translationVectors parsing functionality. An attacker can exploit these vulnerabilities by providing a specially-crafted malformed file, leading to arbitrary code execution. The MOPAC file format within the Unit Cell Translation section is particularly affected.
The Impact of CVE-2022-46292
The impact of these vulnerabilities is severe, with a CVSS base score of 9.8 (Critical). An attacker can remotely exploit the vulnerabilities without requiring any privileges, resulting in high confidentiality, integrity, and availability impact.
Technical Details of CVE-2022-46292
The following technical details outline the vulnerability, affected systems and versions, as well as the exploitation mechanism.
Vulnerability Description
Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in Open Babel 3.1.1 and master commit 530dbfa3, allowing attackers to achieve arbitrary code execution.
Affected Systems and Versions
Exploitation Mechanism
By providing a specially-crafted malformed file, attackers can trigger the vulnerability in the translationVectors parsing functionality, enabling arbitrary code execution.
Mitigation and Prevention
To safeguard systems from CVE-2022-46292, immediate actions and long-term security practices need to be implemented.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security updates released by Open Babel and apply patches promptly to address any known vulnerabilities.