Advisory Details

May 6th, 2021

(0Day) Esri ArcReader PMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

ZDI-21-520
ZDI-CAN-12502

CVE ID
CVSS SCORE 3.3, AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
AFFECTED VENDORS Esri
AFFECTED PRODUCTS ArcReader
VULNERABILITY DETAILS

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Esri ArcReader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PMF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of current process.

ADDITIONAL DETAILS

This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline.

11/24/20 – ZDI reported the vulnerability to the vendor
02/05/21 – The vendor requested technical clarification
02/09/20 – ZDI provided additional evidence
03/15/21 – The vendor indicated they had fixes ready
03/25/21 – The vendor communicated the cases would be included in a future release
03/25/21 – ZDI requested an ETA for the release and notified the vendor of the intention to publish the reports as 0-day advisories if no timely fix was provided
04/23/21 – ZDI requested an update and notified the vendor of the intention to publish the reports as 0-day advisories in 05/04/21

-- Mitigation:
Given the nature of the vulnerability the only salient mitigation strategy is to restrict interaction with the application.


DISCLOSURE TIMELINE
  • 2020-11-24 - Vulnerability reported to vendor
  • 2021-05-06 - Coordinated public release of advisory
CREDIT Simon Zuckerbraun - Trend Micro Zero Day Initiative
BACK TO ADVISORIES