Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-42529

Опубликовано: 02 мая 2022
Источник: debian

Описание

XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
exempifixed2.6.0-1package

Примечания

  • https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html

  • https://cgit.freedesktop.org/exempi/commit/?h=2.6.0&id=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48

  • https://github.com/adobe/XMP-Toolkit-SDK/compare/v2021.07...v2021.08

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 4 года назад

XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.

CVSS3: 7.8
nvd
почти 4 года назад

XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.

CVSS3: 7.8
github
почти 4 года назад

XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.

CVSS3: 7.8
fstec
больше 4 лет назад

Уязвимость программного обеспечения Adobe XMP-Toolkit-SDK, связанная с переполнением буфера на стеке, позволяющая нарушителю выполнить произвольный код