CVE-2022-46295

9.8 CRITICAL

📋 TL;DR

CVE-2022-46295 is a critical out-of-bounds write vulnerability in Open Babel's Gaussian file format parser that allows arbitrary code execution when processing malicious files. This affects Open Babel 3.1.1 and development versions, potentially impacting any system or application that uses Open Babel for chemical file format conversion. Attackers can exploit this by providing specially crafted files to trigger the vulnerability.

💻 Affected Systems

Products:
  • Open Babel
Versions: 3.1.1 and development versions including master commit 530dbfa3
Operating Systems: All platforms running Open Babel
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability specifically affects the Gaussian file format parser within Open Babel's translationVectors functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with arbitrary code execution leading to complete control of the affected system, data theft, or lateral movement within the network.

🟠

Likely Case

Remote code execution leading to application compromise, data exfiltration, or installation of malware/backdoors on systems processing untrusted Gaussian files.

🟢

If Mitigated

Denial of service or application crash if memory protections prevent code execution, though exploitation is still possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only a malicious file to be processed by vulnerable Open Babel instances. The vulnerability is well-documented with public technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Open Babel 3.1.2 and later

Vendor Advisory: https://github.com/openbabel/openbabel/security/advisories/GHSA-5r5m-65gx-8j4v

Restart Required: Yes

Instructions:

1. Update Open Babel to version 3.1.2 or later. 2. Restart any services or applications using Open Babel. 3. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Disable Gaussian file format processing

all

Configure Open Babel to reject or skip Gaussian file format processing if not required

# Configuration depends on how Open Babel is integrated. Check application-specific settings.

Input validation and sanitization

all

Implement strict validation of Gaussian files before processing with Open Babel

# Implement file validation logic in your application before passing to Open Babel

🧯 If You Can't Patch

  • Implement strict access controls to limit who can submit files for processing
  • Deploy Open Babel in isolated containers or sandboxes with minimal privileges

🔍 How to Verify

Check if Vulnerable:

Check Open Babel version: if version is 3.1.1 or development version with commit 530dbfa3 or earlier, the system is vulnerable.

Check Version:

obabel -V

Verify Fix Applied:

Verify Open Babel version is 3.1.2 or later using 'obabel -V' or equivalent version check command.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or abnormal termination when processing Gaussian files
  • Memory access violation errors in application logs
  • Unexpected process creation from Open Babel

Network Indicators:

  • Unusual outbound connections from systems running Open Babel
  • File uploads to Open Babel services followed by suspicious activity

SIEM Query:

Process: (obabel OR openbabel) AND (EventID: 1000 OR "access violation" OR "segmentation fault")

🔗 References

📤 Share & Export