First published: Tue Mar 16 2021(Updated: )
Multiple buffer overflow vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
Credit: psirt@esri.com psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri ArcReader | ||
Esri Arcgis Engine | <=10.8.1 | |
Esri Arcgis Pro | <=2.7 | |
ESRI ArcMap | <=10.8.1 | |
Esri ArcReader | <=10.8.1 | |
Esri ArcGIS | <=10.8.1 | |
Esri Arcgis Desktop | <=10.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29097 is a vulnerability in Esri ArcReader that allows remote attackers to execute arbitrary code.
In order to exploit CVE-2021-29097, the target must visit a malicious page or open a malicious file.
Versions up to and including 10.8.1 of Esri ArcReader are affected by CVE-2021-29097.
CVE-2021-29097 has a severity rating of 7.8 (high).
You can find more information about CVE-2021-29097 in the Esri security advisory and the Zero Day Initiative advisories.