
Cloud Vulnerability DB
A community-led vulnerabilities database
XMP Toolkit SDK version 2020.1 and earlier versions contain a stack-based buffer overflow vulnerability identified as CVE-2021-39847. The vulnerability was disclosed in September 2021 and affects the exempi package, which is an implementation of XMP (Extensible Metadata Platform). Exploitation of this vulnerability requires user interaction, specifically opening a crafted file (Debian Tracker).
The vulnerability is classified as a stack-based buffer overflow that could potentially lead to arbitrary code execution in the context of the current user. The issue affects the exempi package, which is an implementation of the XMP Toolkit SDK (Debian LTS).
If successfully exploited, this vulnerability could result in arbitrary code execution in the context of the current user. The attack requires user interaction, specifically the opening of a specially crafted file, which somewhat limits its impact (Debian Tracker).
Fixed versions have been released to address this vulnerability. For Debian systems, the issue has been fixed in version 2.5.0-2+deb10u1 for Debian 10 (buster). The vulnerability has also been fixed in bookworm (2.6.3-1) and later releases. Users are recommended to upgrade their exempi packages to the latest version (Debian LTS, Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."