Description
XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3585-1 | exempi security update |
Debian DLA |
DLA-4264-1 | exempi security update |
EUVD |
EUVD-2021-26204 | XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file. |
Ubuntu USN |
USN-5483-1 | Exempi vulnerabilities |
References
History
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: adobe
Published:
Updated: 2025-11-03T19:26:18.688Z
Reserved: 2021-08-23T00:00:00.000Z
Link: CVE-2021-39847
No data.
Status : Modified
Published: 2021-09-01T15:15:12.827
Modified: 2025-11-03T20:15:49.890
Link: CVE-2021-39847
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN