CVE-2021-33643Out-of-bounds Read in Libtar

CWE-125Out-of-bounds Read8 documents7 sources
Severity
9.1CRITICALNVD
EPSS
0.2%
top 52.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 10
Latest updateMar 31

Description

An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages15 packages

NVDfeep/libtar< 1.2.21
debiandebian/libtar< libtar 1.2.20-8+deb12u1 (bookworm)
Debianfeep/libtar< 1.2.20-8+deb12u1~deb11u1+1
Ubuntufeep/libtar< 1.2.20-8ubuntu0.20.04.1+4
CVEListV5feep/libtar<1.2.21

Also affects: Fedora 35, 36, 37

🔴Vulnerability Details

3
OSV
libtar vulnerabilities2025-03-31
GHSA
GHSA-j7g9-fcw9-wxcf: An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longli2022-08-11
OSV
CVE-2021-33643: An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longli2022-08-10

📋Vendor Advisories

4
Ubuntu
libtar vulnerabilities2025-03-31
Red Hat
libtar: out-of-bounds read in gnu_longlink2022-08-10
Microsoft
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink causing an out-of-bounds read.2022-08-09
Debian
CVE-2021-33643: libtar - An attacker who submits a crafted tar file with size in header struct being 0 ma...2021
CVE-2021-33643 — Out-of-bounds Read in Feep Libtar | cvebase