Intel

AIKIDO-2025-10875

SharpCompress is vulnerable to Denial of Service (DoS)

Denial of Service (DoS) Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

21

Low Risk

This Affects:

DOTNETSharpCompress
0.1.0 - 0.41.0
Fixed in 0.42.0

TL;DR

Affected versions of this package are vulnerable to denial-of-service (DoS) because malformed TAR headers in compressed files can be misinterpreted as LongName/LongLink entries with multi-gigabyte sizes, causing excessive memory allocation. The fix adds a 32KB MAX_LONG_NAME_SIZE limit and validates sizes before allocation, rejecting invalid headers with an InvalidFormatException. A regression test ensures that oversized (e.g., 8GB) fake headers now fail safely instead of exhausting memory.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

SharpCompress is vulnerable to Denial of Service (DoS) in versions 0.1.0 - 0.41.0.

How to fix this

Upgrade the SharpCompress library to the patch version.