CVE-2022-32096

Source
https://cve.org/CVERecord?id=CVE-2022-32096
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-32096.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-32096
Downstream
Published
2022-07-13T16:15:08.950Z
Modified
2026-03-13T05:50:56.805450Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Rhonabwy before v1.1.5 was discovered to contain a buffer overflow via the component rjweaesgcmkeyunwrap. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted JWE token.

References

Affected packages

Git / github.com/babelouest/rhonabwy

Affected ranges

Type
GIT
Repo
https://github.com/babelouest/rhonabwy
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "1.1.5"
        }
    ]
}

Affected versions

v0.*
v0.9.10
v0.9.11
v0.9.12
v0.9.13
v0.9.2
v0.9.3
v0.9.4
v0.9.5
v0.9.6
v0.9.7
v0.9.8
v0.9.9
v0.9.99
v0.9.999
v0.9.9999
v1.*
v1.0.0
v1.1.0
v1.1.1
v1.1.2
v1.1.3
v1.1.4

Database specific

vanir_signatures
[
    {
        "signature_type": "Line",
        "signature_version": "v1",
        "target": {
            "file": "tools/rnbyc/rnbyc.c"
        },
        "source": "https://github.com/babelouest/rhonabwy/commit/95415a743a5bb399e4ce80beffe26e49a0ace0b9",
        "digest": {
            "line_hashes": [
                "257047672319347334005511696685262357187",
                "265941919923689063346151393268260886570",
                "113102270343724359756721009245843069877",
                "60169571286526244116120576712416812051",
                "231906486081702620285354893555412086184"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2022-32096-34cfa2b9",
        "deprecated": false
    },
    {
        "signature_type": "Function",
        "signature_version": "v1",
        "target": {
            "file": "tools/rnbyc/rnbyc.c",
            "function": "print_help"
        },
        "source": "https://github.com/babelouest/rhonabwy/commit/95415a743a5bb399e4ce80beffe26e49a0ace0b9",
        "digest": {
            "length": 5010.0,
            "function_hash": "76788603250249583139725563930766410867"
        },
        "id": "CVE-2022-32096-7b2a6b43",
        "deprecated": false
    },
    {
        "signature_type": "Line",
        "signature_version": "v1",
        "target": {
            "file": "src/jwe.c"
        },
        "source": "https://github.com/babelouest/rhonabwy/commit/b4c2923a1ba4fabf9b55a89244127e153a3e549b",
        "digest": {
            "line_hashes": [
                "203098983376354227696147056036859232351",
                "80722289190606584317862075844343759170",
                "232239679004971832115761400735815521608",
                "99168564466720862095638377773277193418",
                "339255568156754211190134732161496686471",
                "174240757865002099933754484810747946509",
                "55856843168921994466841354640928831035",
                "72418847026648024948677386074683763390",
                "177370314280429233355908583836832230220"
            ],
            "threshold": 0.9
        },
        "id": "CVE-2022-32096-804f2c81",
        "deprecated": false
    },
    {
        "signature_type": "Function",
        "signature_version": "v1",
        "target": {
            "file": "src/jwe.c",
            "function": "r_jwe_aesgcm_key_unwrap"
        },
        "source": "https://github.com/babelouest/rhonabwy/commit/b4c2923a1ba4fabf9b55a89244127e153a3e549b",
        "digest": {
            "length": 2931.0,
            "function_hash": "159557575790542645729137279180272888252"
        },
        "id": "CVE-2022-32096-a0b854e5",
        "deprecated": false
    }
]
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-32096.json"