A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader 10.8.1 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
References
Configurations
History
21 Nov 2024, 06:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.esri.com/arcgis-blog/products/arcgis-desktop/administration/arcreader-general-data-frame-security-update/ - Vendor Advisory |
15 Aug 2022, 19:02
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
References | (CONFIRM) https://www.esri.com/arcgis-blog/products/arcgis-desktop/administration/arcreader-general-data-frame-security-update/ - Vendor Advisory | |
CPE | cpe:2.3:a:esri:arcreader:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
12 Aug 2022, 21:43
Type | Values Removed | Values Added |
---|---|---|
Summary | A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader 10.8.1 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user. |
12 Aug 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-08-12 19:15
Updated : 2024-11-21 06:00
NVD link : CVE-2021-29117
Mitre link : CVE-2021-29117
CVE.ORG link : CVE-2021-29117
JSON object : View
Products Affected
esri
- arcreader
CWE
CWE-416
Use After Free