{
    "CVE_data_meta": {
        "ASSIGNER": "psirt@adobe.com",
        "DATE_PUBLIC": "2021-09-14T23:00:00.000Z",
        "ID": "CVE-2021-40716",
        "STATE": "PUBLIC",
        "TITLE": "XMP Toolkit SDK SVG_Adapter Out-of-bounds Read Information Disclosure"
    },
    "affects": {
        "vendor": {
            "vendor_data": [
                {
                    "product": {
                        "product_data": [
                            {
                                "product_name": "XMP Toolkit",
                                "version": {
                                    "version_data": [
                                        {
                                            "version_affected": "<=",
                                            "version_value": "2021.07"
                                        },
                                        {
                                            "version_affected": "<=",
                                            "version_value": "None"
                                        },
                                        {
                                            "version_affected": "<=",
                                            "version_value": "None"
                                        },
                                        {
                                            "version_affected": "<=",
                                            "version_value": "None"
                                        }
                                    ]
                                }
                            }
                        ]
                    },
                    "vendor_name": "Adobe"
                }
            ]
        }
    },
    "data_format": "MITRE",
    "data_type": "CVE",
    "data_version": "4.0",
    "description": {
        "description_data": [
            {
                "lang": "eng",
                "value": "XMP Toolkit SDK versions 2021.07 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
            }
        ]
    },
    "impact": {
        "cvss": {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "availabilityImpact": "None",
            "baseScore": 5.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
        }
    },
    "problemtype": {
        "problemtype_data": [
            {
                "description": [
                    {
                        "lang": "eng",
                        "value": "Out-of-bounds Read (CWE-125)"
                    }
                ]
            }
        ]
    },
    "references": {
        "reference_data": [
            {
                "refsource": "MISC",
                "url": "https://helpx.adobe.com/security/products/xmpcore/apsb21-85.html",
                "name": "https://helpx.adobe.com/security/products/xmpcore/apsb21-85.html"
            },
            {
                "refsource": "MLIST",
                "name": "[debian-lts-announce] 20230925 [SECURITY] [DLA 3585-1] exempi security update",
                "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html"
            }
        ]
    },
    "source": {
        "discovery": "EXTERNAL"
    }
}