First published: Fri Aug 12 2022(Updated: )
An out-of-bounds read vulnerability exists when parsing a specially crafted file in Esri ArcReader 10.8.1 (and earlier) which allow an unauthenticated attacker to induce an information disclosure issue in the context of the current user.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
Esri ArcReader | <=10.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-29118.
The severity of CVE-2021-29118 is medium with a severity score of 5.5.
Esri ArcReader versions up to and including 10.8.1 are affected by CVE-2021-29118.
An attacker can exploit CVE-2021-29118 by parsing a specially crafted file in Esri ArcReader, which can result in an out-of-bounds read vulnerability and information disclosure.
No, authentication is not required for an attacker to exploit CVE-2021-29118.