XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.4.5-2ubuntu0.1", "binary_name": "exempi" }, { "binary_version": "2.4.5-2ubuntu0.1", "binary_name": "exempi-dbgsym" }, { "binary_version": "2.4.5-2ubuntu0.1", "binary_name": "libexempi-dev" }, { "binary_version": "2.4.5-2ubuntu0.1", "binary_name": "libexempi3" }, { "binary_version": "2.4.5-2ubuntu0.1", "binary_name": "libexempi3-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.5.1-1ubuntu0.1", "binary_name": "exempi" }, { "binary_version": "2.5.1-1ubuntu0.1", "binary_name": "exempi-dbgsym" }, { "binary_version": "2.5.1-1ubuntu0.1", "binary_name": "libexempi-dev" }, { "binary_version": "2.5.1-1ubuntu0.1", "binary_name": "libexempi8" }, { "binary_version": "2.5.1-1ubuntu0.1", "binary_name": "libexempi8-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.5.2-1ubuntu0.22.04.1", "binary_name": "exempi" }, { "binary_version": "2.5.2-1ubuntu0.22.04.1", "binary_name": "exempi-dbgsym" }, { "binary_version": "2.5.2-1ubuntu0.22.04.1", "binary_name": "libexempi-dev" }, { "binary_version": "2.5.2-1ubuntu0.22.04.1", "binary_name": "libexempi8" }, { "binary_version": "2.5.2-1ubuntu0.22.04.1", "binary_name": "libexempi8-dbgsym" } ] }