CVE-2025-10995
📋 TL;DR
A memory corruption vulnerability in Open Babel's zlib decompression stream allows local attackers to potentially execute arbitrary code or cause denial of service. This affects users of Open Babel up to version 3.1.1 who process untrusted input files. The vulnerability requires local access to exploit.
💻 Affected Systems
- Open Babel
📦 What is this software?
Open Babel by Openbabel
⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation leading to full system compromise through arbitrary code execution
Likely Case
Application crash or denial of service when processing malicious input files
If Mitigated
Limited impact due to local-only access requirement and proper file input validation
🎯 Exploit Status
Proof-of-concept available in GitHub attachments, requires local access and specific file processing
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 3.1.1 (check latest release)
Vendor Advisory: https://github.com/openbabel/openbabel/issues/2832
Restart Required: No
Instructions:
1. Check current Open Babel version. 2. Update to latest version from official repository. 3. Recompile if using source distribution. 4. Test with known safe files.
🔧 Temporary Workarounds
Restrict file processing
allLimit Open Babel to trusted input sources and implement file validation
Sandbox execution
linuxRun Open Babel in container or restricted environment
docker run --read-only --security-opt=no-new-privileges openbabel
🧯 If You Can't Patch
- Implement strict file input validation and sanitization
- Run Open Babel with minimal privileges and in isolated environments
🔍 How to Verify
Check if Vulnerable:
Check Open Babel version: if ≤ 3.1.1, vulnerable
Check Version:
obabel --version
Verify Fix Applied:
Verify version > 3.1.1 and test with known safe files
📡 Detection & Monitoring
Log Indicators:
- Segmentation faults in Open Babel processes
- Unexpected process termination
Network Indicators:
- None - local-only vulnerability
SIEM Query:
Process:obabel AND (EventID:1000 OR Signal:SIGSEGV)