First published: Thu Mar 25 2021(Updated: )
A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
Credit: psirt@esri.com psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri ArcReader | ||
Esri Arcgis Engine | <=10.8.1 | |
Esri Arcgis Pro | <=2.7 | |
ESRI ArcMap | <=10.8.1 | |
Esri ArcReader | <=10.8.1 | |
Esri Arcgis Desktop | <=10.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29096 is a vulnerability that allows remote attackers to execute arbitrary code on affected installations of Esri ArcReader software.
This vulnerability can be exploited when the target visits a malicious page or opens a malicious file.
Esri ArcReader, ArcGIS Desktop, ArcGIS Engine, and ArcGIS Pro versions up to 10.8.1 and 2.7 are affected.
CVE-2021-29096 has a severity value of 7.8 (high).
Yes, you can find more information about this vulnerability at the following references: - [Esri Security Advisory](https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster) - [Zero Day Initiative Advisory](https://www.zerodayinitiative.com/advisories/ZDI-21-370/)