Multiple vulnerabilities have been identified when processing specially crafted files that may allow arbitrary code execution in image services or raster analytics in ArcGIS Server 10.8.1 (and earlier).
Esri has released updates for ArcGIS Server that resolve the moderate-risk vulnerabilities here.
Common Vulnerability Scoring System (CVSS v3.1) Details
6.4 Base Score, 5.6 Temporal Score
- Exploit Code Maturity: Unproven
- Remediation Level: Official Fix Available
- Report Confidence: Confirmed by Esri
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
We provide the temporal score in addition to the base score to allow our customers to better assess risk of this vulnerability to their operations. Please see Common Vulnerability Scoring System for more information on the definition of these metrics.
Vulnerability Details
- CVE-2021-29093 – Use-After-Free CWE-416 – CVSS 6.4
- CVE-2021-29094 – Buffer overflow CWE-120 – CVSS 6.4
- CVE-2021-29095 – Uninitialized pointer CWE-824 – CVSS 6.4
Acknowledgements
- Francis Provencher {PRL} working with Trend Micro Zero Day Initiative
- Simon Zuckerbraun working with Trend Micro Zero Day Initiative
- rgod working with Trend Micro Zero Day Initiative
Commenting is not enabled for this article.