Heap-based Buffer Overflow in Open Babel Product by Open Babel Vendor
CVE-2025-10997

4.8MEDIUM

Key Information:

Vendor

Open Babel

Vendor
CVE Published:
26 September 2025

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2025-10997?

A security flaw exists in Open Babel prior to version 3.1.1, specifically in the ChemKinFormat::CheckSpecies function located in the chemkinformat.cpp file. This vulnerability can be exploited locally to achieve a heap-based buffer overflow, allowing for potential manipulation of memory space during execution. Although the attack vector requires local access, it poses a risk if exploited. Developers are urged to update to the latest secured version to mitigate the risks associated with this vulnerability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Open Babel 3.1.0

Open Babel 3.1.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
4.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

ahuo (VulDB User)
.