A vulnerability was detected in Open Babel up to 3.1.1. The impacted element is the function OBAtom::SetFormalCharge in the library include/openbabel/atom.h of the component MOL2 File Handler. The manipulation results in out-of-bounds read. It is possible to launch the attack remotely. The exploit is now public and may be used. The patch is identified as e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. A patch should be applied to remediate this issue. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/VedantMadane/openbabel/commit/e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a | |
| https://github.com/oneafter/0128/blob/main/ob2/repro.mol2 | Exploit |
| https://github.com/openbabel/openbabel/issues/2848 | Exploit Issue Tracking |
| https://github.com/openbabel/openbabel/pull/2862 | |
| https://vuldb.com/?ctiid.346651 | Permissions Required VDB Entry |
| https://vuldb.com/?id.346651 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.754379 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-02-19 07:17
Updated : 2026-03-01 07:15
NVD link : CVE-2026-2705
Mitre link : CVE-2026-2705
CVE.ORG link : CVE-2026-2705
JSON object : View
Products Affected
openbabel
- open_babel
