XMP Toolkit version 2020.1 (and earlier) is affected by a Buffer Underflow vulnerability which could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
| Link | Resource |
|---|---|
| https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html | Patch Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html | Mailing List Third Party Advisory |
| https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html | Patch Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2025/08/msg00003.html |
Configurations
History
03 Nov 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 06:13
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html - Patch, Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html - Mailing List, Third Party Advisory |
20 Oct 2023, 20:37
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html - Mailing List, Third Party Advisory | |
| First Time |
Debian
Debian debian Linux |
|
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
26 Sep 2023, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2021-09-01 15:15
Updated : 2025-11-03 20:15
NVD link : CVE-2021-36064
Mitre link : CVE-2021-36064
CVE.ORG link : CVE-2021-36064
JSON object : View
Products Affected
adobe
- xmp_toolkit_software_development_kit
debian
- debian_linux
CWE
CWE-124
Buffer Underwrite ('Buffer Underflow')
