Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33055: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in alexcrichton tar-rs

0
Medium
VulnerabilityCVE-2026-33055cvecve-2026-33055cwe-843
Published: Fri Mar 20 2026 (03/20/2026, 07:06:08 UTC)
Source: CVE Database V5
Vendor/Project: alexcrichton
Product: tar-rs

Description

CVE-2026-33055 is a medium severity vulnerability in the Rust tar archive library tar-rs (versions below 0. 4. 45). It arises from inconsistent handling of PAX size headers compared to other tar parsers, leading to discrepancies in how archives are unpacked. This type confusion (CWE-843) can cause different views of file sizes between tar-rs and other tools, potentially enabling crafted archives to behave unexpectedly when parsed. The issue does not require privileges or authentication but does require user interaction to unpack a malicious archive. Although no known exploits are reported, any system relying on tar-rs for archive parsing may face risks of inconsistent or incorrect file extraction. The vulnerability was fixed in tar-rs version 0. 4. 45.

AI-Powered Analysis

AILast updated: 03/20/2026, 07:39:39 UTC

Technical Analysis

CVE-2026-33055 is a vulnerability in the tar-rs Rust crate, a library for reading and writing tar archives. The flaw stems from conditional logic in versions 0.4.44 and earlier that skips processing the PAX size header when the base header size is nonzero. This contrasts with other tar parsers, such as Go's archive/tar, which always honor the PAX size override unconditionally. The inconsistency leads to a type confusion scenario (CWE-843) where archives crafted with differing size headers can be interpreted differently by tar-rs compared to other parsers. This discrepancy can cause files to appear with different sizes or contents depending on the parser used, potentially enabling attackers to craft malicious archives that behave unexpectedly or bypass security checks relying on consistent archive parsing. The vulnerability does not involve direct memory corruption but impacts the integrity and reliability of archive unpacking. It requires user interaction to unpack a malicious archive but no privileges or authentication. The issue was addressed in tar-rs version 0.4.45 by aligning the handling of PAX size headers with other parsers, ensuring consistent interpretation of archive contents.

Potential Impact

The primary impact of this vulnerability is on the integrity and consistency of archive unpacking processes in applications using tar-rs. Discrepancies in file size interpretation can lead to unexpected behavior such as overwriting files, bypassing security controls that rely on archive content validation, or causing application logic errors. This can affect software supply chains, automated deployment pipelines, or any Rust-based systems that consume tar archives. While it does not directly lead to remote code execution or privilege escalation, the inconsistency can be leveraged in complex attack scenarios involving crafted archives to disrupt operations or evade detection. Organizations relying on tar-rs for critical archive processing may experience data integrity issues or operational disruptions. Since no known exploits are reported, the immediate risk is moderate, but the potential for misuse exists especially in environments where archive integrity is critical.

Mitigation Recommendations

The definitive mitigation is to upgrade all instances of the tar-rs crate to version 0.4.45 or later, where the handling of PAX size headers is corrected. Developers should audit their Rust dependencies to identify usage of tar-rs and ensure timely updates. Additionally, organizations should implement strict validation and sanitization of tar archives before processing, including verifying archive consistency across multiple parsers if feasible. Employing sandboxing or running archive extraction in isolated environments can limit potential damage from malformed archives. Monitoring for unusual archive unpacking behaviors or discrepancies in file sizes can help detect exploitation attempts. Finally, educating developers and DevOps teams about this inconsistency will reduce the risk of integrating vulnerable versions into production systems.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T18:10:50.213Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bcf624e32a4fbe5f3a710c

Added to database: 3/20/2026, 7:24:20 AM

Last enriched: 3/20/2026, 7:39:39 AM

Last updated: 3/20/2026, 8:26:29 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses