A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader 10.8.1 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
References
Link | Resource |
---|---|
https://www.esri.com/arcgis-blog/products/arcgis-desktop/administration/arcreader-general-data-frame-security-update/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Esri
Published: 2022-02-07T00:00:00
Updated: 2022-08-12T18:45:12
Reserved: 2021-03-23T00:00:00
Link: CVE-2021-29117
JSON object: View
NVD Information
Status : Modified
Published: 2022-08-12T19:15:08.020
Modified: 2023-11-07T03:32:32.590
Link: CVE-2021-29117
JSON object: View
Redhat Information
No data.
CWE