t1lib

Page content
  • Author: voroskoi
  • Vulnerable: 5.1.1-1
  • Unaffected: 5.1.1-2terminus1

Hamid Ebadi has reported a vulnerability in t1lib, which can be exploited by malicious users to potentially compromise a vulnerable system. The vulnerability is caused due to a boundary error within the “intT1_EnvGetCompletePath()” function in lib/t1lib/t1env.c. This can be exploited to cause a buffer overflow when an application processes an overly long string in the “FileName” parameter.

CVEs: