Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-4033

Опубликовано: 27 июл. 2007
Источник: ubuntu
Приоритет: medium
CVSS2: 7.5

Описание

Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter. NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.

РелизСтатусПримечание
dapper

released

5.1.0-2ubuntu0.6.06.1
devel

released

5.1.0-3
edgy

released

5.1.0-2ubuntu0.6.10.1
feisty

released

5.1.0-2ubuntu0.7.04.1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

not-affected

links to t1lib
devel

DNE

edgy

not-affected

links to t1lib
feisty

not-affected

links to t1lib
gutsy

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

links to t1lib
edgy

not-affected

links to t1lib
feisty

not-affected

links to t1lib
gutsy

not-affected

links to t1lib
upstream

needs-triage

Показывать по

7.5 High

CVSS2

Связанные уязвимости

redhat
почти 18 лет назад

Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter. NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.

nvd
почти 18 лет назад

Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter. NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.

debian
почти 18 лет назад

Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/ ...

github
около 3 лет назад

Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter. NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.

fstec
больше 17 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

7.5 High

CVSS2