CVE-2022-23596

Junrar is an open source java RAR archive library. In affected versions A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. The problem is patched in 7.4.1. There are no known workarounds and users are advised to upgrade as soon as possible.
Configurations

Configuration 1 (hide)

cpe:2.3:a:junrar_project:junrar:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:48

Type Values Removed Values Added
References () https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7 - Patch, Third Party Advisory () https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7 - Patch, Third Party Advisory
References () https://github.com/junrar/junrar/issues/73 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/junrar/junrar/issues/73 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5 - Third Party Advisory () https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5 - Third Party Advisory

Information

Published : 2022-02-01 12:15

Updated : 2024-11-21 06:48


NVD link : CVE-2022-23596

Mitre link : CVE-2022-23596

CVE.ORG link : CVE-2022-23596


JSON object : View

Products Affected

junrar_project

  • junrar
CWE
CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')