CVE-2021-29117

A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader 10.8.1 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
Configurations

Configuration 1 (hide)

cpe:2.3:a:esri:arcreader:*:*:*:*:*:*:*:*

History

15 Aug 2022, 19:02

Type Values Removed Values Added
First Time Esri arcreader
Esri
CWE CWE-416
CPE cpe:2.3:a:esri:arcreader:*:*:*:*:*:*:*:*
References (CONFIRM) https://www.esri.com/arcgis-blog/products/arcgis-desktop/administration/arcreader-general-data-frame-security-update/ - (CONFIRM) https://www.esri.com/arcgis-blog/products/arcgis-desktop/administration/arcreader-general-data-frame-security-update/ - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

12 Aug 2022, 21:43

Type Values Removed Values Added
Summary A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader 10.8.1 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user. A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader 10.8.1 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.

12 Aug 2022, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-12 19:15

Updated : 2023-12-10 14:35


NVD link : CVE-2021-29117

Mitre link : CVE-2021-29117

CVE.ORG link : CVE-2021-29117


JSON object : View

Products Affected

esri

  • arcreader
CWE
CWE-416

Use After Free