Multiple buffer overflow vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
References
Link | Resource |
---|---|
https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/ | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-360/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-363/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-364/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-365/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-367/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-368/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-369/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-371/ | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Esri
Published: 2021-03-16T00:00:00
Updated: 2021-03-31T18:09:22
Reserved: 2021-03-23T00:00:00
Link: CVE-2021-29097
JSON object: View
NVD Information
Status : Modified
Published: 2021-03-25T21:15:13.467
Modified: 2024-05-21T14:14:17.320
Link: CVE-2021-29097
JSON object: View
Redhat Information
No data.