Описание
A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
Ссылки
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 10.8.1 (включая)Версия до 2.7 (включая)Версия до 10.8.1 (включая)Версия до 10.8.1 (включая)
Одно из
cpe:2.3:a:esri:arcgis_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcgis_pro:*:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcmap:*:*:*:*:*:*:*:*
cpe:2.3:a:esri:arcreader:*:*:*:*:*:*:*:*
EPSS
Процентиль: 51%
0.00278
Низкий
7.8 High
CVSS3
7.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-416
CWE-416
Связанные уязвимости
CVSS3: 7.8
github
больше 3 лет назад
A use-after-free vulnerability when parsing a specially crafted file in Esri ArcReader, ArcGIS Desktop, ArcGIS Engine 10.8.1 (and earlier) and ArcGIS Pro 2.7 (and earlier) allows an unauthenticated attacker to achieve arbitrary code execution in the context of the current user.
EPSS
Процентиль: 51%
0.00278
Низкий
7.8 High
CVSS3
7.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-416
CWE-416