CVE-2021-33643 — Out-of-bounds Read in Libtar
Severity
9.1CRITICALNVD
EPSS
0.2%
top 52.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 10
Latest updateMar 31
Description
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink, causing an out-of-bounds read.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2
Affected Packages15 packages
Also affects: Fedora 35, 36, 37
🔴Vulnerability Details
3GHSA▶
GHSA-j7g9-fcw9-wxcf: An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longli↗2022-08-11
OSV▶
CVE-2021-33643: An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longli↗2022-08-10
📋Vendor Advisories
4Microsoft▶
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longlink causing an out-of-bounds read.↗2022-08-09
Debian▶
CVE-2021-33643: libtar - An attacker who submits a crafted tar file with size in header struct being 0 ma...↗2021