Vulnerability Description
A vulnerability was identified in Open Babel up to 3.1.1. This impacts the function OBAtom::GetExplicitValence of the file isrc/atom.cpp of the component CDXML File Handler. Such manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit is publicly available and might be used. The name of the patch is e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. It is best practice to apply a patch to resolve this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openbabel | Open Babel | <= 3.1.1 |
Related Weaknesses (CWE)
References
- https://github.com/VedantMadane/openbabel/commit/e23a224b8fd9d7c2a7cde9ef4ec6afbPatch
- https://github.com/oneafter/0128/blob/main/ob3/repro.cdxmlIssue Tracking
- https://github.com/openbabel/openbabel/issues/2848ExploitIssue Tracking
- https://github.com/openbabel/openbabel/pull/2862Issue Tracking
- https://vuldb.com/?ctiid.348303Permissions RequiredVDB Entry
- https://vuldb.com/?id.348303Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.763756Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-3408?
CVE-2026-3408 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A vulnerability was identified in Open Babel up to 3.1.1. This impacts the function OBAtom::GetExplicitValence of the file isrc/atom.cpp of the component CDXML File Handler. Such manipulation leads to...
How severe is CVE-2026-3408?
CVE-2026-3408 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3408?
Check the references section above for vendor advisories and patch information. Affected products include: Openbabel Open Babel.