SharpCompress is vulnerable to Denial of Service (DoS)
21
Low Risk
Affected versions of this package are vulnerable to denial-of-service (DoS) because malformed TAR headers in compressed files can be misinterpreted as LongName/LongLink entries with multi-gigabyte sizes, causing excessive memory allocation. The fix adds a 32KB MAX_LONG_NAME_SIZE limit and validates sizes before allocation, rejecting invalid headers with an InvalidFormatException. A regression test ensures that oversized (e.g., 8GB) fake headers now fail safely instead of exhausting memory.
You are affected if you are using a version that falls within the vulnerable range.
SharpCompress is vulnerable to Denial of Service (DoS) in versions 0.1.0 - 0.41.0.
Upgrade the SharpCompress library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant