Files
CVEs-PoC/2007/CVE-2007-4033.md
T
2024-06-18 02:51:15 +02:00

18 lines
784 B
Markdown

### [CVE-2007-4033](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter. NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.
### POC
#### Reference
- https://www.exploit-db.com/exploits/4227
#### Github
No PoCs found on GitHub currently.