CVE-2021-33644 — Out-of-bounds Read in Libtar
Severity
8.1HIGHNVD
OSV9.1
EPSS
0.2%
top 52.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 10
Latest updateMar 31
Description
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname, causing an out-of-bounds read.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:HExploitability: 2.8 | Impact: 5.2
Affected Packages15 packages
Also affects: Fedora 35, 36, 37
🔴Vulnerability Details
3GHSA▶
GHSA-f326-p7mm-52h2: An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longna↗2022-08-11
OSV▶
CVE-2021-33644: An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longna↗2022-08-10
📋Vendor Advisories
4Microsoft▶
An attacker who submits a crafted tar file with size in header struct being 0 may be able to trigger an calling of malloc(0) for a variable gnu_longname causing an out-of-bounds read.↗2022-08-09
Debian▶
CVE-2021-33644: libtar - An attacker who submits a crafted tar file with size in header struct being 0 ma...↗2021