CVE-2021-29093

A use-after-free vulnerability when parsing a specially crafted file in Esri ArcGIS Server 10.8.1 (and earlier) allows an authenticated attacker with specialized permissions to achieve arbitrary code execution in the context of the service account.
Configurations

Configuration 1 (hide)

cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:00

Type Values Removed Values Added
References () https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/security-advisory-server-imageĀ - Vendor Advisory () https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/security-advisory-server-imageĀ - Vendor Advisory

23 Feb 2024, 19:38

Type Values Removed Values Added
First Time Esri arcgis Server
CPE cpe:2.3:a:esri:arcgis:*:*:*:*:*:*:*:* cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:*

Information

Published : 2021-03-25 21:15

Updated : 2024-11-21 06:00


NVD link : CVE-2021-29093

Mitre link : CVE-2021-29093

CVE.ORG link : CVE-2021-29093


JSON object : View

Products Affected

esri

  • arcgis_server
CWE
CWE-416

Use After Free