CWE
121 119
Advisory Published
Updated

CVE-2021-39847: XMP Toolkit SDK Stack-based Buffer Overflow Could Lead To Arbitrary Code Execution

First published: Wed Sep 01 2021(Updated: )

XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.

Credit: psirt@adobe.com

Affected SoftwareAffected VersionHow to fix
Adobe XMP Toolkit Software Development Kit<=2020.1
Debian GNU/Linux=10.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2021-39847?

    CVE-2021-39847 is classified as a critical vulnerability due to the potential for arbitrary code execution.

  • How do I fix CVE-2021-39847?

    To fix CVE-2021-39847, upgrade to the latest version of Adobe XMP Toolkit SDK or apply security patches provided by Adobe.

  • What impact does CVE-2021-39847 have on affected systems?

    CVE-2021-39847 can lead to arbitrary code execution, which may allow an attacker to take control of the affected system.

  • What versions of Adobe XMP Toolkit SDK are affected by CVE-2021-39847?

    CVE-2021-39847 affects Adobe XMP Toolkit SDK versions up to and including 2020.1.

  • What type of attack vector is involved in CVE-2021-39847?

    CVE-2021-39847 requires user interaction, as exploitation necessitates that the victim opens a specially crafted file.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203