First published: Thu Mar 25 2021(Updated: )
A use-after-free vulnerability when parsing a specially crafted file in Esri ArcGIS Server 10.8.1 (and earlier) allows an authenticated attacker with specialized permissions to achieve arbitrary code execution in the context of the service account.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri ArcGIS | <=10.8.1 | |
ESRI ArcGIS for Server | <=10.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29093 has a high severity rating due to its potential for arbitrary code execution.
To mitigate CVE-2021-29093, upgrade Esri ArcGIS Server to version 10.8.2 or later.
CVE-2021-29093 affects authenticated users with specialized permissions in Esri ArcGIS Server 10.8.1 and earlier versions.
CVE-2021-29093 is classified as a use-after-free vulnerability.
An attacker exploiting CVE-2021-29093 can achieve arbitrary code execution within the context of the service account.