CVE-2021-29096
Published Mar 25, 2021
Last updated 6 months ago
Overview
- Description
- A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
- Source
- psirt@esri.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:esri:arcgis_engine:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A49E9C8-9522-45F8-B3B8-FB58D40105B4", "versionEndIncluding": "10.8.1" }, { "criteria": "cpe:2.3:a:esri:arcgis_pro:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3B1EC12-C1FB-408B-823C-8FF6581ED8ED", "versionEndIncluding": "2.7" }, { "criteria": "cpe:2.3:a:esri:arcmap:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C055EC7D-F119-4350-9C8D-731873D70D4F", "versionEndIncluding": "10.8.1" }, { "criteria": "cpe:2.3:a:esri:arcreader:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93D3FB72-81E3-4DA3-88E7-B12BEDE51A53", "versionEndIncluding": "10.8.1" } ], "operator": "OR" } ] } ]