CVE-2022-46291
Linux Debian vulnerability analysis and mitigation

Overview

Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in Open Babel 3.1.1 and master commit 530dbfa3. This vulnerability (CVE-2022-46291) specifically affects the MSI file format. A specially-crafted malformed file can lead to arbitrary code execution when processed by the affected software (Talos Report).

Technical details

The vulnerability exists in the MSI PeriodicType functionality where the translationVectors parsing can lead to an out-of-bounds write condition. The issue occurs when processing the 'PeriodicType' string in the MSI format, where the numTranslationVectors index can increase arbitrarily without proper bounds checking, eventually leading to writing beyond the allocated buffer space. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) by NIST NVD with vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, while Talos assigned it a score of 9.8 (CRITICAL) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerability can lead to arbitrary code execution on the affected system when a maliciously crafted file is processed. Given that Open Babel is used in various chemistry and research settings, including online chemical format converters and molecule viewers, the potential impact is significant as it could be accessible via network (Talos Blog).

Mitigation and workarounds

As of the disclosure date, no official fix has been released by the vendor. The maintainer of Open Babel did not release a patch during the 90-day window specified in Cisco's coordinated vulnerability disclosure policy (Talos Report).

Community reactions

The vulnerability was publicly disclosed by Cisco Talos on July 21, 2023, after the vendor declined to release an update within the 90-day period as outlined in Cisco's vulnerability disclosure policy. The issue remains unpatched in multiple distributions including Debian's bullseye, bookworm, and sid releases (Debian Tracker).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59030HIGH7.5
  • Linux DebianLinux Debian
  • pdns-recursor
NoYesDec 09, 2025
CVE-2025-59029MEDIUM5.3
  • Linux DebianLinux Debian
  • pdns-recursor
NoYesDec 09, 2025
CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • kernel-debug-modules-internal
NoYesDec 09, 2025
CVE-2025-40343N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel
NoYesDec 09, 2025
CVE-2025-40342N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel-matched
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management