CVE-2021-36051

XMP Toolkit SDK version 2020.1 (and earlier) is affected by a buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a specially-crafted .cpp file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:adobe:xmp_toolkit_software_development_kit:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:13

Type Values Removed Values Added
References () https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html - Patch, Vendor Advisory () https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html - Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html - Mailing List, Third Party Advisory

20 Oct 2023, 20:40

Type Values Removed Values Added
First Time Debian debian Linux
Debian
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
References (MLIST) https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html - (MLIST) https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html - Mailing List, Third Party Advisory
References (MISC) https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html - Vendor Advisory (MISC) https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html - Patch, Vendor Advisory

26 Sep 2023, 01:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html -
CWE CWE-120 CWE-122

Information

Published : 2021-10-04 14:15

Updated : 2024-11-21 06:13


NVD link : CVE-2021-36051

Mitre link : CVE-2021-36051

CVE.ORG link : CVE-2021-36051


JSON object : View

Products Affected

adobe

  • xmp_toolkit_software_development_kit

debian

  • debian_linux
CWE
CWE-122

Heap-based Buffer Overflow

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')