First published: Thu Mar 25 2021(Updated: )
Multiple uninitialized pointer vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
Credit: psirt@esri.com psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri ArcReader | ||
Esri Arcgis Engine | <=10.8.1 | |
Esri Arcgis Pro | <=2.7 | |
ESRI ArcMap | <=10.8.1 | |
Esri ArcReader | <=10.8.1 | |
Esri ArcGIS | <=10.8.1 | |
Esri Arcgis Desktop | <=10.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29098 is a vulnerability in Esri ArcReader that allows remote attackers to execute arbitrary code.
CVE-2021-29098 is exploited by remote attackers through the parsing of malicious PMF files by the target.
Esri ArcReader versions up to and including 10.8.1, and Esri ArcGIS Desktop versions up to and including 10.8.1 and Esri ArcGIS Pro versions up to and including 2.7 are affected.
CVE-2021-29098 has a severity rating of 7.8, which is considered high.
To fix CVE-2021-29098, users should update to a version of Esri ArcReader, Esri ArcGIS Desktop, or Esri ArcGIS Pro that is not affected by the vulnerability.