Impact
The library incorrectly skips the PAX size header when the base header size is nonzero, causing tar archives to be interpreted at different sizes by this parser than by other implementations. This discrepancy can lead to confusion or unexpected behavior in applications that rely on consistent archive contents, and may be exploited to craft archives that behave differently across utilities, potentially leading to logic errors or resource misuse.
Affected Systems
The vulnerability affects the Rust tar archive library maintained by alexcrichton, specifically versions 0.4.44 and earlier. The issue is resolved in version 0.4.45 and later.
Risk and Exploitability
The CVSS score of 5.1 indicates a moderate impact; EPSS is below 1%, suggesting low exploitation probability and the vulnerability is not listed in CISA's KEV catalog. The likely attack vector involves delivering a malicious tar archive to an application that uses this library; the attacker does not gain code execution but can cause misinterpretation of file sizes, potentially leading to incorrect processing or errors. Because the flaw only affects archive parsing, it does not directly enable arbitrary code execution or denial of service without additional application vulnerabilities.
OpenCVE Enrichment
Github GHSA