Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-42885

Опубликовано: 21 июл. 2023
Источник: debian
EPSS Низкий

Описание

A use of uninitialized pointer vulnerability exists in the GRO format res functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openbabelunfixedpackage
openbabelpostponedtrixiepackage
openbabelpostponedbookwormpackage
openbabelno-dsabullseyepackage
openbabelpostponedbusterpackage

Примечания

  • https://talosintelligence.com/vulnerability_reports/TALOS-2022-1668

  • https://github.com/openbabel/openbabel/issues/2650

EPSS

Процентиль: 35%
0.00144
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 2 лет назад

A use of uninitialized pointer vulnerability exists in the GRO format res functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 9.8
nvd
больше 2 лет назад

A use of uninitialized pointer vulnerability exists in the GRO format res functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 9.8
github
больше 2 лет назад

A use of uninitialized pointer vulnerability exists in the GRO format res functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

CVSS3: 9.8
fstec
больше 2 лет назад

Уязвимость функции res программного обеспечения преобразования форматов файлов химических веществ Open Babel, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 35%
0.00144
Низкий