7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.733 High
EPSS
Percentile
98.1%
XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based
buffer overflow vulnerability potentially resulting in arbitrary code
execution in the context of the current user. Exploitation requires user
interaction in that a victim must open a crafted file.
Author | Note |
---|---|
mdeslaur | fixed in adobe’s 2021.08 code drop |
cgit.freedesktop.org/exempi/commit/?h=2.6.0&id=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48
github.com/adobe/XMP-Toolkit-SDK/compare/v2021.07...v2021.08
helpx.adobe.com/security/products/xmpcore/apsb21-108.html
launchpad.net/bugs/cve/CVE-2021-42529
nvd.nist.gov/vuln/detail/CVE-2021-42529
security-tracker.debian.org/tracker/CVE-2021-42529
ubuntu.com/security/notices/USN-5483-1
www.cve.org/CVERecord?id=CVE-2021-42529
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.733 High
EPSS
Percentile
98.1%