Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution

Posted on October 22, 2025October 22, 2025 By CWS

Oct 22, 2025Ravie LakshmananVulnerability / Knowledge Safety
Cybersecurity researchers have disclosed particulars of a high-severity flaw impacting the favored async-tar Rust library and its forks, together with tokio-tar, that might end in distant code execution beneath sure circumstances.
The vulnerability, tracked as CVE-2025-62518 (CVSS rating: 8.1), has been codenamed TARmageddon by Edera, which found the problem in late August 2025. It impacts a number of widely-used initiatives, reminiscent of testcontainers and wasmCloud.
“Within the worst-case state of affairs, this vulnerability has a severity of 8.1 (Excessive) and may result in Distant Code Execution (RCE) by file overwriting assaults, reminiscent of changing configuration recordsdata or hijacking construct backends,” the Seattle-based safety firm mentioned.

The issue is compounded by the truth that tokio-tar is basically abandonware regardless of attracting 1000’s of downloads by way of crates.io. Tokio-tar is a Rust library for asynchronously studying and writing TAR archives constructed atop the Tokio runtime for the programming language. The Rust crate was final up to date on July 15, 2023.
Within the absence of a patch for tokio-tar, customers counting on the library are suggested emigrate to astral-tokio-tar, which has launched model 0.5.6 to remediate the flaw.
“Variations of astral-tokio-tar previous to 0.5.6 comprise a boundary parsing vulnerability that enables attackers to smuggle further archive entries by exploiting inconsistent PAX/ustar header dealing with,” Astral developer William Woodruff mentioned in an alert.
“When processing archives with PAX-extended headers containing dimension overrides, the parser incorrectly advances stream place based mostly on ustar header dimension (typically zero) as an alternative of the PAX-specified dimension, inflicting it to interpret file content material as official TAR headers.”
The difficulty, in a nutshell, is the results of inconsistent dealing with when dealing with PAX prolonged headers and ustar headers when figuring out file information boundaries. PAX, quick for transportable archive interchange, is an prolonged model of the USTAR format used to retailer properties of member recordsdata in a TAR archive.
The mismatch between a PAX prolonged headers and ustar headers – the place the PAX header accurately specifies the file dimension, whereas the ustar header incorrectly specifies the file dimension as zero (as an alternative of the PAX dimension) – results in a parsing inconsistency, inflicting the library to interpret the inside content material as further outer archive entries.
“By advancing 0 bytes, the parser fails to skip over the precise file information (which is a nested TAR archive) and instantly encounters the subsequent legitimate TAR header positioned initially of the nested archive,” Edera defined. “It then incorrectly interprets the inside archive’s headers as official entries belonging to the outer archive.”

In consequence, an attacker might exploit this habits to “smuggle” additional archives when the library is processing nested TAR recordsdata, thereby making it potential to overwrite recordsdata inside extraction directories, finally paving the best way for arbitrary code execution.
In a hypothetical assault state of affairs, an attacker might add a specially-crafted package deal to PyPI such that the outer TAR incorporates a official pyproject.toml, whereas the hidden inside TAR incorporates a malicious one which hijacks the construct backend and overwrites the precise file throughout set up.
“Whereas Rust’s ensures make it considerably tougher to introduce reminiscence security bugs (like buffer overflows or use-after-free), it doesn’t eradicate logic bugs – and this parsing inconsistency is essentially a logic flaw,” Edera mentioned. “Builders should stay vigilant towards all courses of vulnerabilities, whatever the language used.”

The Hacker News Tags:AsyncTar, Code, Enable, Execution, Flaw, Library, Remote, Rust, TARmageddon

Post navigation

Previous Post: Threat Actors Compromise Xubuntu Website To Deliver Malicious Windows Executable
Next Post: Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025

Related Posts

Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors The Hacker News
What Security Leaders Need to Know About AI Governance for SaaS The Hacker News
Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide The Hacker News
38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases The Hacker News
Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission The Hacker News
251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark