Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter. NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2007-07-27 22:30
Updated : 2024-02-28 11:01
NVD link : CVE-2007-4033
Mitre link : CVE-2007-4033
CVE.ORG link : CVE-2007-4033
JSON object : View
Products Affected
t1lib
- t1lib
php
- php
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer