CVE-2025-10995: Memory Corruption in Open Babel
A security vulnerability has been detected in Open Babel up to 3.1.1. This vulnerability affects the function zlib_stream::basic_unzip_streambuf::underflow in the library /src/zipstreamimpl.h. Such manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-10995 is a security vulnerability identified in Open Babel versions up to 3.1.1, specifically affecting the function zlib_stream::basic_unzip_streambuf::underflow within the source file /src/zipstreamimpl.h. The vulnerability results from improper handling of data during decompression operations, leading to memory corruption. This type of flaw can cause unpredictable behavior including application crashes, data corruption, or potentially arbitrary code execution if exploited. The vulnerability requires local access with at least low privileges (PR:L) and does not require user interaction (UI:N). The attack complexity is low (AC:L), indicating that an attacker with local access can reliably trigger the flaw without needing specialized conditions. The CVSS 4.0 base score is 4.8, categorized as medium severity, reflecting limited impact due to the local access requirement and the lack of known exploits in the wild at the time of publication. The vulnerability affects the decompression stream buffer mechanism in Open Babel, a widely used open-source chemical toolbox designed to speak the many languages of chemical data. Exploitation could allow an attacker with local access to cause memory corruption, potentially leading to denial of service or escalation of privileges if combined with other vulnerabilities. No patches or fixes are linked in the provided data, indicating that users should monitor for updates from the Open Babel project. The vulnerability was publicly disclosed shortly after being reserved, suggesting a rapid publication cycle but no immediate exploitation evidence.
Potential Impact
For European organizations, the impact of CVE-2025-10995 depends largely on their use of Open Babel in local environments. Open Babel is commonly used in academic, pharmaceutical, chemical research, and bioinformatics sectors for molecular modeling and chemical data processing. Organizations in these sectors may run Open Babel on workstations or servers where local users or processes could exploit this vulnerability. The local access requirement limits remote exploitation, reducing risk for perimeter-facing systems. However, insider threats or compromised user accounts could leverage this flaw to destabilize systems or escalate privileges. Memory corruption vulnerabilities can lead to denial of service, impacting availability of critical research tools, or potentially enable code execution if chained with other vulnerabilities, threatening confidentiality and integrity of sensitive chemical data. Given the specialized nature of Open Babel, the threat is more pronounced in research institutions and companies involved in chemical and pharmaceutical development across Europe. Disruption or compromise in these environments could delay research, cause data loss, or expose proprietary chemical information. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance.
Mitigation Recommendations
European organizations using Open Babel should implement the following specific mitigations: 1) Restrict local access to systems running Open Babel to trusted users only, enforcing strict access controls and user account management. 2) Monitor and audit local user activities on systems with Open Babel installations to detect unusual behavior that could indicate exploitation attempts. 3) Apply principle of least privilege to user accounts to minimize the impact of potential exploitation. 4) Segregate systems running Open Babel from critical infrastructure to contain potential compromise. 5) Stay informed about updates from the Open Babel project and apply patches promptly once available. 6) Consider deploying runtime memory protection techniques such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) on affected systems to mitigate exploitation impact. 7) Conduct internal vulnerability assessments and penetration testing focusing on local privilege escalation and memory corruption vectors in environments where Open Babel is used. 8) Educate users about the risks of running untrusted code or opening unverified chemical data files locally to reduce inadvertent triggering of the vulnerability.
Affected Countries
Germany, France, United Kingdom, Switzerland, Netherlands, Belgium, Sweden
CVE-2025-10995: Memory Corruption in Open Babel
Description
A security vulnerability has been detected in Open Babel up to 3.1.1. This vulnerability affects the function zlib_stream::basic_unzip_streambuf::underflow in the library /src/zipstreamimpl.h. Such manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10995 is a security vulnerability identified in Open Babel versions up to 3.1.1, specifically affecting the function zlib_stream::basic_unzip_streambuf::underflow within the source file /src/zipstreamimpl.h. The vulnerability results from improper handling of data during decompression operations, leading to memory corruption. This type of flaw can cause unpredictable behavior including application crashes, data corruption, or potentially arbitrary code execution if exploited. The vulnerability requires local access with at least low privileges (PR:L) and does not require user interaction (UI:N). The attack complexity is low (AC:L), indicating that an attacker with local access can reliably trigger the flaw without needing specialized conditions. The CVSS 4.0 base score is 4.8, categorized as medium severity, reflecting limited impact due to the local access requirement and the lack of known exploits in the wild at the time of publication. The vulnerability affects the decompression stream buffer mechanism in Open Babel, a widely used open-source chemical toolbox designed to speak the many languages of chemical data. Exploitation could allow an attacker with local access to cause memory corruption, potentially leading to denial of service or escalation of privileges if combined with other vulnerabilities. No patches or fixes are linked in the provided data, indicating that users should monitor for updates from the Open Babel project. The vulnerability was publicly disclosed shortly after being reserved, suggesting a rapid publication cycle but no immediate exploitation evidence.
Potential Impact
For European organizations, the impact of CVE-2025-10995 depends largely on their use of Open Babel in local environments. Open Babel is commonly used in academic, pharmaceutical, chemical research, and bioinformatics sectors for molecular modeling and chemical data processing. Organizations in these sectors may run Open Babel on workstations or servers where local users or processes could exploit this vulnerability. The local access requirement limits remote exploitation, reducing risk for perimeter-facing systems. However, insider threats or compromised user accounts could leverage this flaw to destabilize systems or escalate privileges. Memory corruption vulnerabilities can lead to denial of service, impacting availability of critical research tools, or potentially enable code execution if chained with other vulnerabilities, threatening confidentiality and integrity of sensitive chemical data. Given the specialized nature of Open Babel, the threat is more pronounced in research institutions and companies involved in chemical and pharmaceutical development across Europe. Disruption or compromise in these environments could delay research, cause data loss, or expose proprietary chemical information. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance.
Mitigation Recommendations
European organizations using Open Babel should implement the following specific mitigations: 1) Restrict local access to systems running Open Babel to trusted users only, enforcing strict access controls and user account management. 2) Monitor and audit local user activities on systems with Open Babel installations to detect unusual behavior that could indicate exploitation attempts. 3) Apply principle of least privilege to user accounts to minimize the impact of potential exploitation. 4) Segregate systems running Open Babel from critical infrastructure to contain potential compromise. 5) Stay informed about updates from the Open Babel project and apply patches promptly once available. 6) Consider deploying runtime memory protection techniques such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) on affected systems to mitigate exploitation impact. 7) Conduct internal vulnerability assessments and penetration testing focusing on local privilege escalation and memory corruption vectors in environments where Open Babel is used. 8) Educate users about the risks of running untrusted code or opening unverified chemical data files locally to reduce inadvertent triggering of the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-25T18:04:54.689Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d5f81a9e21be37e939ec73
Added to database: 9/26/2025, 2:19:06 AM
Last enriched: 9/26/2025, 2:34:33 AM
Last updated: 9/26/2025, 3:21:13 AM
Views: 3
Related Threats
CVE-2025-9044: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mapster Mapster WP Maps
MediumCVE-2025-11000: NULL Pointer Dereference in Open Babel
MediumCVE-2025-10745: CWE-330 Use of Insufficiently Random Values in specialk Banhammer – Monitor Site Traffic, Block Bad Users and Bots
MediumCVE-2025-10377: CWE-352 Cross-Site Request Forgery (CSRF) in qriouslad System Dashboard
MediumCVE-2025-10173: CWE-862 Missing Authorization in roxnor ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.