CVE-2022-23596
Summary
| CVE | CVE-2022-23596 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-02-01 12:15:00 UTC |
| Updated | 2022-02-04 17:15:00 UTC |
| Description | Junrar is an open source java RAR archive library. In affected versions A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. The problem is patched in 7.4.1. There are no known workarounds and users are advised to upgrade as soon as possible. |
Risk And Classification
Problem Types: CWE-835
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Junrar Project | Junrar | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| fix: invalid subheader type would throw npe and make the extract loop · junrar/junrar@7b16b3d · GitHub | MISC | github.com | |
| A carefully crafted RAR archive can trigger an infinite loop while extracting · Advisory · junrar/junrar · GitHub | CONFIRM | github.com | |
| [BUG]A carefully crafted RAR archive can trigger an infinite loop while parsing. · Issue #73 · junrar/junrar · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.