Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-39804

CVE-2023-39804: GNU Tar DOS Vulnerability in PAX Archive

CVE-2023-39804 is a denial of service vulnerability in GNU Tar affecting versions before 1.35, where mishandled extension attributes in PAX archives cause application crashes. This article covers technical details, impact, and mitigation.

Published: February 11, 2026

CVE-2023-39804 Overview

CVE-2023-39804 is a denial of service vulnerability affecting GNU tar versions prior to 1.35. The vulnerability exists in the handling of extension attributes within PAX archives, where mishandled attributes can lead to an application crash in the xheader.c source file. This vulnerability can be exploited locally to cause GNU tar to crash when processing specially crafted PAX archive files.

Critical Impact

Attackers can cause GNU tar to crash by providing maliciously crafted PAX archives with malformed extension attributes, potentially disrupting backup operations, automated scripts, and system administration tasks that rely on tar functionality.

Affected Products

  • GNU tar versions prior to 1.35

Discovery Timeline

  • 2024-03-27 - CVE-2023-39804 published to NVD
  • 2025-11-04 - Last updated in NVD database

Technical Details for CVE-2023-39804

Vulnerability Analysis

This vulnerability stems from improper handling of extension attributes when processing PAX (POSIX.1-2001) archive format files. PAX archives support extended header records that store metadata as key-value pairs, including file attributes that cannot be represented in traditional tar formats. The vulnerability is located in the xheader.c file, which is responsible for parsing and processing these extended headers.

When GNU tar encounters a PAX archive with malformed or specially crafted extension attributes, the parsing logic in xheader.c fails to properly validate input, leading to a crash condition. This represents an input validation vulnerability that affects the availability of the application without impacting confidentiality or integrity of data.

Root Cause

The root cause lies in insufficient validation of extension attribute data within the xheader.c parsing routines. When processing PAX extended headers, the code does not properly handle certain malformed attribute values, leading to unexpected program termination. The vulnerable code path is triggered during the extraction or listing of PAX archives containing crafted extension attributes.

Attack Vector

The attack requires local access to the system and involves providing a maliciously crafted PAX archive to GNU tar for processing. An attacker could exploit this vulnerability through several scenarios:

The vulnerability is triggered when a user extracts, lists, or otherwise processes a PAX archive containing malformed extension attributes. This could occur through direct command-line usage, automated backup scripts, or package extraction operations. Since the attack vector is local, the attacker would need to either place the malicious archive on the target system or convince a user to process an attacker-controlled archive.

The GNU Tar Source Code Reference provides details on the vulnerable code section in the xheader.c file at line 1723 of the release_1_34 branch.

Detection Methods for CVE-2023-39804

Indicators of Compromise

  • Unexpected GNU tar crashes or core dumps when processing PAX format archives
  • Error messages referencing xheader.c in tar application logs or system logs
  • Repeated tar process terminations during automated backup or extraction operations
  • Presence of suspicious .tar or .pax archives with unusual extension attribute structures

Detection Strategies

  • Monitor system logs for repeated tar process crashes, particularly those occurring during archive extraction operations
  • Implement file integrity monitoring on systems where tar is used for automated processing to detect anomalous archive files
  • Use process monitoring tools to track tar execution and flag unexpected terminations
  • Review package management and backup logs for patterns of failed archive operations

Monitoring Recommendations

  • Configure application crash reporting to alert on repeated GNU tar failures
  • Implement rate limiting or sandboxing for archive processing operations to contain potential DoS conditions
  • Monitor disk space usage for core dumps that may indicate exploitation attempts
  • Track GNU tar version information across systems to identify unpatched installations

How to Mitigate CVE-2023-39804

Immediate Actions Required

  • Upgrade GNU tar to version 1.35 or later on all affected systems
  • Audit automated scripts and backup processes that utilize GNU tar for processing untrusted archives
  • Implement input validation for archive files before processing with tar, particularly in automated workflows
  • Consider using alternative archive utilities for processing untrusted PAX archives until patching is complete

Patch Information

GNU has addressed this vulnerability in GNU tar version 1.35. The fix is available in GNU Tar Commit a339f05, which corrects the extension attribute handling in xheader.c.

For Debian-based systems, security updates are available as documented in the Debian LTS Announcement March 2024. The Debian Bug Report #1058079 provides additional tracking information for Debian distributions.

Workarounds

  • Restrict processing of PAX archives from untrusted sources until patching is completed
  • Use --format=gnu or --format=ustar options when creating archives to avoid PAX format where possible
  • Implement wrapper scripts that validate archive format and source before passing to tar
  • Run tar operations in sandboxed environments or containers to limit the impact of crashes on production systems
bash
# Check current GNU tar version
tar --version

# Example: Upgrade tar on Debian/Ubuntu systems
sudo apt update && sudo apt upgrade tar

# Example: Upgrade tar on RHEL/CentOS systems
sudo yum update tar

# Verify tar version after upgrade (should be 1.35 or later)
tar --version | head -1

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechGnu Tar

  • SeverityMEDIUM

  • CVSS Score6.2

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-noinfo
  • Technical References
  • Debian Bug Report #1058079

  • GNU Tar Source Code Reference

  • Debian LTS Announcement March 2024
  • Vendor Resources
  • GNU Tar Commit a339f05
  • Related CVEs
  • CVE-2025-45582: GNU Tar Path Traversal Vulnerability

  • CVE-2022-48303: GNU Tar Use-After-Free Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English