Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-42532

Опубликовано: 02 мая 2022
Источник: debian
EPSS Низкий

Описание

XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
exempifixed2.6.0-1package

Примечания

  • https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html

  • https://cgit.freedesktop.org/exempi/commit/?h=2.6.0&id=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48

  • https://gitlab.freedesktop.org/libopenraw/exempi/-/releases

EPSS

Процентиль: 66%
0.00507
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 4 года назад

XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.

CVSS3: 7.8
nvd
почти 4 года назад

XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.

CVSS3: 7.8
github
почти 4 года назад

XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.

CVSS3: 7.8
fstec
больше 4 лет назад

Уязвимость программного обеспечения Adobe XMP-Toolkit-SDK, связанная с переполнением буфера на стеке, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 66%
0.00507
Низкий