Search criteria
6 vulnerabilities found for ArcGIS Pro by Esri
CVE-2025-1067 (GCVE-0-2025-1067)
Vulnerability from cvelistv5 – Published: 2025-02-25 16:26 – Updated: 2025-02-26 00:03
VLAI?
Title
There is a code injection vulnerability in ArcGIS Pro
Summary
There is an untrusted search path vulnerability in Esri ArcGIS Pro 3.3 and 3.4 that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS ArcGIS Pro, the file could execute and run malicious commands under the context of the victim. This issue is addressed in ArcGIS Pro 3.3.3 and 3.4.1.
Severity ?
7.3 (High)
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Esri | ArcGIS Pro |
Affected:
3.3.0 , ≤ 3.3.2
(semver)
Affected: 3.4.0 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-1067",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-25T16:46:02.735946Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-25T16:46:09.739Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"64 bit"
],
"product": "ArcGIS Pro",
"vendor": "Esri",
"versions": [
{
"lessThanOrEqual": "3.3.2",
"status": "affected",
"version": "3.3.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "3.4.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "There is an untrusted search path vulnerability in Esri ArcGIS Pro 3.3 and 3.4\u0026nbsp;that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS ArcGIS Pro, the file could execute and run malicious commands under the context of the victim. This issue is addressed in ArcGIS Pro 3.3.3 and 3.4.1."
}
],
"value": "There is an untrusted search path vulnerability in Esri ArcGIS Pro 3.3 and 3.4\u00a0that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS ArcGIS Pro, the file could execute and run malicious commands under the context of the victim. This issue is addressed in ArcGIS Pro 3.3.3 and 3.4.1."
}
],
"impacts": [
{
"capecId": "CAPEC-558",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-558 Replace Trusted Executable"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-26T00:03:50.613Z",
"orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e",
"shortName": "Esri"
},
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/administration/administration/arcgis-pro-and-arcgis-allsource-patches-address-high-severity-vulnerabilities"
}
],
"source": {
"defect": [
"BUG-000173823"
],
"discovery": "UNKNOWN"
},
"title": "There is a code injection vulnerability in ArcGIS Pro",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e",
"assignerShortName": "Esri",
"cveId": "CVE-2025-1067",
"datePublished": "2025-02-25T16:26:03.580Z",
"dateReserved": "2025-02-05T18:48:27.690Z",
"dateUpdated": "2025-02-26T00:03:50.613Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-29098 (GCVE-0-2021-29098)
Vulnerability from cvelistv5 – Published: 2021-03-25 20:37 – Updated: 2025-04-10 15:22
VLAI?
Title
ArcGIS general raster security update: uninitialized pointer
Summary
Multiple uninitialized pointer vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
Severity ?
7.8 (High)
CWE
- CWE-824 - Access of Uninitialized Pointer
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Esri | ArcReader |
Affected:
All , < 10.9.0
(custom)
|
||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:02:50.333Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-372/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-29098",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-10T14:50:14.442719Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-10T15:22:04.460Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"platforms": [
"x86 Windows"
],
"product": "ArcReader",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x86 Windows"
],
"product": "ArcGIS Desktop",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"X64 Windows"
],
"product": "ArcGIS Engine",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64 Linux"
],
"product": "ArcGIS Engine",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"X86 Windows"
],
"product": "ArcGIS Engine",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"X86 Linux"
],
"product": "ArcGIS Engine",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64 Windows"
],
"product": "ArcGIS Pro",
"vendor": "Esri",
"versions": [
{
"lessThan": "4.7.2",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64 Windows"
],
"product": "ArcGIS Desktop Background Geoprocessing",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64 Linux"
],
"product": "ArcGIS Desktop Background Geoprocessing",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-03-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Multiple uninitialized pointer vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-824",
"description": "CWE-824 Access of Uninitialized Pointer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-31T18:08:21.000Z",
"orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e",
"shortName": "Esri"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-372/"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "ArcGIS general raster security update: uninitialized pointer",
"x_generator": {
"engine": "Vulnogram 0.0.8"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@esri.com",
"DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
"ID": "CVE-2021-29098",
"STATE": "PUBLIC",
"TITLE": "ArcGIS general raster security update: uninitialized pointer"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ArcReader",
"version": {
"version_data": [
{
"platform": "x86 Windows",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
}
]
}
},
{
"product_name": "ArcGIS Desktop",
"version": {
"version_data": [
{
"platform": "x86 Windows",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
}
]
}
},
{
"product_name": "ArcGIS Engine",
"version": {
"version_data": [
{
"platform": "X64 Windows",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
},
{
"platform": "x64 Linux",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
},
{
"platform": "X86 Windows",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
},
{
"platform": "X86 Linux",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
}
]
}
},
{
"product_name": "ArcGIS Pro",
"version": {
"version_data": [
{
"platform": "x64 Windows",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "4.7.2"
}
]
}
},
{
"product_name": "ArcGIS Desktop Background Geoprocessing",
"version": {
"version_data": [
{
"platform": "x64 Windows",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
},
{
"platform": "x64 Linux",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
}
]
}
}
]
},
"vendor_name": "Esri"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple uninitialized pointer vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.8"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-824 Access of Uninitialized Pointer"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/",
"refsource": "CONFIRM",
"url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-372/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-372/"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e",
"assignerShortName": "Esri",
"cveId": "CVE-2021-29098",
"datePublished": "2021-03-25T20:37:05.516Z",
"dateReserved": "2021-03-23T00:00:00.000Z",
"dateUpdated": "2025-04-10T15:22:04.460Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-29097 (GCVE-0-2021-29097)
Vulnerability from cvelistv5 – Published: 2021-03-25 20:36 – Updated: 2024-09-17 03:17
VLAI?
Title
ArcGIS general raster security update: buffer overflow
Summary
Multiple buffer overflow vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
Severity ?
7.8 (High)
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Esri | ArcReader |
Affected:
All , < 10.9.0
(custom)
|
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:02:50.311Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-367/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-371/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-364/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-363/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-368/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"platforms": [
"x86"
],
"product": "ArcReader",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x86"
],
"product": "ArcGIS Desktop",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64"
],
"product": "ArcGIS Engine",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x86"
],
"product": "ArcGIS Engine",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64"
],
"product": "ArcGIS Pro",
"vendor": "Esri",
"versions": [
{
"lessThan": "4.7.2",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x86"
],
"product": "ArcGIS Desktop Background Geoprocessing",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64"
],
"product": "ArcGIS Desktop Background Geoprocessing",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-03-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflow vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "CWE-122 Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121 Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-31T18:09:22",
"orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e",
"shortName": "Esri"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-367/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-371/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-364/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-363/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-368/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "ArcGIS general raster security update: buffer overflow",
"x_generator": {
"engine": "Vulnogram 0.0.8"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@esri.com",
"DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
"ID": "CVE-2021-29097",
"STATE": "PUBLIC",
"TITLE": "ArcGIS general raster security update: buffer overflow"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ArcReader",
"version": {
"version_data": [
{
"platform": "x86",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
}
]
}
},
{
"product_name": "ArcGIS Desktop",
"version": {
"version_data": [
{
"platform": "x86",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
}
]
}
},
{
"product_name": "ArcGIS Engine",
"version": {
"version_data": [
{
"platform": "x64",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
},
{
"platform": "x86",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
}
]
}
},
{
"product_name": "ArcGIS Pro",
"version": {
"version_data": [
{
"platform": "x64",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "4.7.2"
}
]
}
},
{
"product_name": "ArcGIS Desktop Background Geoprocessing",
"version": {
"version_data": [
{
"platform": "x86",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9"
},
{
"platform": "x64",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9"
}
]
}
}
]
},
"vendor_name": "Esri"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple buffer overflow vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.8"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122 Heap-based Buffer Overflow"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-121 Stack-based Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/",
"refsource": "CONFIRM",
"url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-367/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-367/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-371/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-371/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-364/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-364/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-363/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-363/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-368/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-368/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e",
"assignerShortName": "Esri",
"cveId": "CVE-2021-29097",
"datePublished": "2021-03-25T20:36:03.915336Z",
"dateReserved": "2021-03-23T00:00:00",
"dateUpdated": "2024-09-17T03:17:27.744Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-1067 (GCVE-0-2025-1067)
Vulnerability from nvd – Published: 2025-02-25 16:26 – Updated: 2025-02-26 00:03
VLAI?
Title
There is a code injection vulnerability in ArcGIS Pro
Summary
There is an untrusted search path vulnerability in Esri ArcGIS Pro 3.3 and 3.4 that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS ArcGIS Pro, the file could execute and run malicious commands under the context of the victim. This issue is addressed in ArcGIS Pro 3.3.3 and 3.4.1.
Severity ?
7.3 (High)
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Esri | ArcGIS Pro |
Affected:
3.3.0 , ≤ 3.3.2
(semver)
Affected: 3.4.0 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-1067",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-25T16:46:02.735946Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-25T16:46:09.739Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"64 bit"
],
"product": "ArcGIS Pro",
"vendor": "Esri",
"versions": [
{
"lessThanOrEqual": "3.3.2",
"status": "affected",
"version": "3.3.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "3.4.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "There is an untrusted search path vulnerability in Esri ArcGIS Pro 3.3 and 3.4\u0026nbsp;that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS ArcGIS Pro, the file could execute and run malicious commands under the context of the victim. This issue is addressed in ArcGIS Pro 3.3.3 and 3.4.1."
}
],
"value": "There is an untrusted search path vulnerability in Esri ArcGIS Pro 3.3 and 3.4\u00a0that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS ArcGIS Pro, the file could execute and run malicious commands under the context of the victim. This issue is addressed in ArcGIS Pro 3.3.3 and 3.4.1."
}
],
"impacts": [
{
"capecId": "CAPEC-558",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-558 Replace Trusted Executable"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-26T00:03:50.613Z",
"orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e",
"shortName": "Esri"
},
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/administration/administration/arcgis-pro-and-arcgis-allsource-patches-address-high-severity-vulnerabilities"
}
],
"source": {
"defect": [
"BUG-000173823"
],
"discovery": "UNKNOWN"
},
"title": "There is a code injection vulnerability in ArcGIS Pro",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e",
"assignerShortName": "Esri",
"cveId": "CVE-2025-1067",
"datePublished": "2025-02-25T16:26:03.580Z",
"dateReserved": "2025-02-05T18:48:27.690Z",
"dateUpdated": "2025-02-26T00:03:50.613Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-29098 (GCVE-0-2021-29098)
Vulnerability from nvd – Published: 2021-03-25 20:37 – Updated: 2025-04-10 15:22
VLAI?
Title
ArcGIS general raster security update: uninitialized pointer
Summary
Multiple uninitialized pointer vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
Severity ?
7.8 (High)
CWE
- CWE-824 - Access of Uninitialized Pointer
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Esri | ArcReader |
Affected:
All , < 10.9.0
(custom)
|
||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:02:50.333Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-372/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-29098",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-10T14:50:14.442719Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-10T15:22:04.460Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"platforms": [
"x86 Windows"
],
"product": "ArcReader",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x86 Windows"
],
"product": "ArcGIS Desktop",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"X64 Windows"
],
"product": "ArcGIS Engine",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64 Linux"
],
"product": "ArcGIS Engine",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"X86 Windows"
],
"product": "ArcGIS Engine",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"X86 Linux"
],
"product": "ArcGIS Engine",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64 Windows"
],
"product": "ArcGIS Pro",
"vendor": "Esri",
"versions": [
{
"lessThan": "4.7.2",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64 Windows"
],
"product": "ArcGIS Desktop Background Geoprocessing",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64 Linux"
],
"product": "ArcGIS Desktop Background Geoprocessing",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-03-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Multiple uninitialized pointer vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-824",
"description": "CWE-824 Access of Uninitialized Pointer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-31T18:08:21.000Z",
"orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e",
"shortName": "Esri"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-372/"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "ArcGIS general raster security update: uninitialized pointer",
"x_generator": {
"engine": "Vulnogram 0.0.8"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@esri.com",
"DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
"ID": "CVE-2021-29098",
"STATE": "PUBLIC",
"TITLE": "ArcGIS general raster security update: uninitialized pointer"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ArcReader",
"version": {
"version_data": [
{
"platform": "x86 Windows",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
}
]
}
},
{
"product_name": "ArcGIS Desktop",
"version": {
"version_data": [
{
"platform": "x86 Windows",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
}
]
}
},
{
"product_name": "ArcGIS Engine",
"version": {
"version_data": [
{
"platform": "X64 Windows",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
},
{
"platform": "x64 Linux",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
},
{
"platform": "X86 Windows",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
},
{
"platform": "X86 Linux",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
}
]
}
},
{
"product_name": "ArcGIS Pro",
"version": {
"version_data": [
{
"platform": "x64 Windows",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "4.7.2"
}
]
}
},
{
"product_name": "ArcGIS Desktop Background Geoprocessing",
"version": {
"version_data": [
{
"platform": "x64 Windows",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
},
{
"platform": "x64 Linux",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
}
]
}
}
]
},
"vendor_name": "Esri"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple uninitialized pointer vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.8"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-824 Access of Uninitialized Pointer"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/",
"refsource": "CONFIRM",
"url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-361/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-362/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-372/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-372/"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e",
"assignerShortName": "Esri",
"cveId": "CVE-2021-29098",
"datePublished": "2021-03-25T20:37:05.516Z",
"dateReserved": "2021-03-23T00:00:00.000Z",
"dateUpdated": "2025-04-10T15:22:04.460Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-29097 (GCVE-0-2021-29097)
Vulnerability from nvd – Published: 2021-03-25 20:36 – Updated: 2024-09-17 03:17
VLAI?
Title
ArcGIS general raster security update: buffer overflow
Summary
Multiple buffer overflow vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
Severity ?
7.8 (High)
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Esri | ArcReader |
Affected:
All , < 10.9.0
(custom)
|
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:02:50.311Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-367/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-371/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-364/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-363/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-368/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"platforms": [
"x86"
],
"product": "ArcReader",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x86"
],
"product": "ArcGIS Desktop",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64"
],
"product": "ArcGIS Engine",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x86"
],
"product": "ArcGIS Engine",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9.0",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64"
],
"product": "ArcGIS Pro",
"vendor": "Esri",
"versions": [
{
"lessThan": "4.7.2",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x86"
],
"product": "ArcGIS Desktop Background Geoprocessing",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64"
],
"product": "ArcGIS Desktop Background Geoprocessing",
"vendor": "Esri",
"versions": [
{
"lessThan": "10.9",
"status": "affected",
"version": "All",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-03-16T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflow vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "CWE-122 Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121 Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-31T18:09:22",
"orgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e",
"shortName": "Esri"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-367/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-371/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-364/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-363/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-368/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "ArcGIS general raster security update: buffer overflow",
"x_generator": {
"engine": "Vulnogram 0.0.8"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@esri.com",
"DATE_PUBLIC": "2021-03-16T04:00:00.000Z",
"ID": "CVE-2021-29097",
"STATE": "PUBLIC",
"TITLE": "ArcGIS general raster security update: buffer overflow"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ArcReader",
"version": {
"version_data": [
{
"platform": "x86",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
}
]
}
},
{
"product_name": "ArcGIS Desktop",
"version": {
"version_data": [
{
"platform": "x86",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
}
]
}
},
{
"product_name": "ArcGIS Engine",
"version": {
"version_data": [
{
"platform": "x64",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
},
{
"platform": "x86",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9.0"
}
]
}
},
{
"product_name": "ArcGIS Pro",
"version": {
"version_data": [
{
"platform": "x64",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "4.7.2"
}
]
}
},
{
"product_name": "ArcGIS Desktop Background Geoprocessing",
"version": {
"version_data": [
{
"platform": "x86",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9"
},
{
"platform": "x64",
"version_affected": "\u003c",
"version_name": "All",
"version_value": "10.9"
}
]
}
}
]
},
"vendor_name": "Esri"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple buffer overflow vulnerabilities when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allow an unauthenticated attacker to achieve arbitrary code execution in the context of the current user."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.8"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122 Heap-based Buffer Overflow"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-121 Stack-based Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/",
"refsource": "CONFIRM",
"url": "https://www.esri.com/arcgis-blog/products/arcgis/administration/security-advisory-general-raster/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-367/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-367/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-371/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-371/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-364/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-364/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-363/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-363/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-369/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-368/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-368/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-365/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-360/"
}
]
},
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "cedc17bb-4939-4f40-a1f4-30ae8af1094e",
"assignerShortName": "Esri",
"cveId": "CVE-2021-29097",
"datePublished": "2021-03-25T20:36:03.915336Z",
"dateReserved": "2021-03-23T00:00:00",
"dateUpdated": "2024-09-17T03:17:27.744Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}