Buffer overflow in TinyMUX before 2.4 allows attackers to cause a denial of service via unspecified vectors related to "too many substring matches in a regexp $-command." NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 00:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.tinymux.org/changes.txt - | |
References | () http://www.vupen.com/english/advisories/2007/1213 - |
Information
Published : 2007-04-11 10:19
Updated : 2024-11-21 00:29
NVD link : CVE-2007-1958
Mitre link : CVE-2007-1958
CVE.ORG link : CVE-2007-1958
JSON object : View
Products Affected
tinymux
- tinymux
CWE