Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-42531
HistoryMay 02, 2022 - 12:00 a.m.

CVE-2021-42531

2022-05-0200:00:00
ubuntu.com
ubuntu.com
29
xmp toolkit sdk
stack-based buffer overflow
cve-2021-42531
arbitrary code execution
user interaction
crafted file
adobe
code drop

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.733

Percentile

98.1%

XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based
buffer overflow vulnerability potentially resulting in arbitrary code
execution in the context of the current user. Exploitation requires user
interaction in that a victim must open a crafted file.

Notes

Author Note
mdeslaur fixed in adobe’s 2021.08 code drop
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchexempi< 2.4.5-2ubuntu0.1UNKNOWN
ubuntu20.04noarchexempi< 2.5.1-1ubuntu0.1UNKNOWN
ubuntu21.10noarchexempi< 2.5.2-1ubuntu0.21.10.1UNKNOWN
ubuntu22.04noarchexempi< 2.5.2-1ubuntu0.22.04.1UNKNOWN
ubuntu16.04noarchexempi< anyUNKNOWN

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.733

Percentile

98.1%