CVE-2026-3408

A vulnerability was identified in Open Babel up to 3.1.1. This impacts the function OBAtom::GetExplicitValence of the file isrc/atom.cpp of the component CDXML File Handler. Such manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit is publicly available and might be used. The name of the patch is e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. It is best practice to apply a patch to resolve this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openbabel:open_babel:*:*:*:*:*:*:*:*

History

04 Mar 2026, 02:40

Type Values Removed Values Added
References () https://github.com/VedantMadane/openbabel/commit/e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a - () https://github.com/VedantMadane/openbabel/commit/e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a - Patch
References () https://github.com/oneafter/0128/blob/main/ob3/repro.cdxml - () https://github.com/oneafter/0128/blob/main/ob3/repro.cdxml - Issue Tracking
References () https://github.com/openbabel/openbabel/issues/2848 - () https://github.com/openbabel/openbabel/issues/2848 - Exploit, Issue Tracking
References () https://github.com/openbabel/openbabel/pull/2862 - () https://github.com/openbabel/openbabel/pull/2862 - Issue Tracking
References () https://vuldb.com/?ctiid.348303 - () https://vuldb.com/?ctiid.348303 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.348303 - () https://vuldb.com/?id.348303 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.763756 - () https://vuldb.com/?submit.763756 - Third Party Advisory, VDB Entry
First Time Openbabel open Babel
Openbabel
CWE CWE-787
CPE cpe:2.3:a:openbabel:open_babel:*:*:*:*:*:*:*:*

02 Mar 2026, 20:30

Type Values Removed Values Added
Summary
  • (es) Se ha descubierto una vulnerabilidad en Open Babel hasta 3.1.1, la cual afecta a la función OBAtom::GetExplicitValence del archivo isrc/atom.cpp del componente Gestor de Archivos CDXML. Si se manipula se provoca una desreferencia de puntero nulo. El ataque puede ser lanzado en remoto. El exploit está disponible públicamente y podría ser usado. El nombre del parche es e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. Se recomienda aplicar un parche para resolver este problema.

02 Mar 2026, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-02 04:16

Updated : 2026-03-04 02:40


NVD link : CVE-2026-3408

Mitre link : CVE-2026-3408

CVE.ORG link : CVE-2026-3408


JSON object : View

Products Affected

openbabel

  • open_babel
CWE
CWE-404

Improper Resource Shutdown or Release

CWE-476

NULL Pointer Dereference

CWE-787

Out-of-bounds Write