CVE-2021-29096

A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:esri:arcgis_desktop:*:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_pro:*:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcreader:*:*:*:*:*:*:*:*

History

20 May 2022, 20:44

Type Values Removed Values Added
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-370/ - Third Party Advisory (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-370/ - Third Party Advisory, VDB Entry

30 Mar 2021, 20:16

Type Values Removed Values Added
CPE cpe:2.3:a:esri:arcgis_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_pro:*:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_desktop:*:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcreader:*:*:*:*:*:*:*:*
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 7.8
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-370/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-370/ - Third Party Advisory
References (CONFIRM) https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/ - (CONFIRM) https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/ - Vendor Advisory

30 Mar 2021, 12:16

Type Values Removed Values Added
References
  • (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-370/ -

25 Mar 2021, 19:18

Type Values Removed Values Added
New CVE

Information

Published : 2021-03-25 19:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-29096

Mitre link : CVE-2021-29096

CVE.ORG link : CVE-2021-29096


JSON object : View

Products Affected

esri

  • arcgis_desktop
  • arcgis_engine
  • arcreader
  • arcgis_pro
CWE
CWE-416

Use After Free