Multiple buffer overflow vulnerabilities when parsing a specially crafted file in Esri ArcGIS Server 10.8.1 (and earlier) allows an authenticated attacker with specialized permissions to achieve arbitrary code execution in the context of the service account.
References
| Link | Resource |
|---|---|
| https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/security-advisory-server-image | Vendor Advisory |
Configurations
History
23 Feb 2024, 19:37
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Esri arcgis Server
|
|
| CPE | cpe:2.3:a:esri:arcgis_server:*:*:*:*:*:*:*:* |
Information
Published : 2021-03-25 21:15
Updated : 2024-02-23 19:37
NVD link : CVE-2021-29094
Mitre link : CVE-2021-29094
CVE.ORG link : CVE-2021-29094
JSON object : View
Products Affected
esri
- arcgis_server
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
