Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter. NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2007-07-27 15:30
Updated : 2018-10-15 14:32
NVD link : CVE-2007-4033
Mitre link : CVE-2007-4033
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
php
- php
t1lib
- t1lib