Buffer overflow in TinyMUX before 2.4 allows attackers to cause a denial of service via unspecified vectors related to too many substring matches in a regexp $-command. NOTE: some of these details are obtained from third party information.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tinymux | Tinymux | * | 2.3 (including) |
Tinymux | Ubuntu | dapper | * |
Tinymux | Ubuntu | devel | * |
Tinymux | Ubuntu | edgy | * |
Tinymux | Ubuntu | feisty | * |
Tinymux | Ubuntu | gutsy | * |
Tinymux | Ubuntu | hardy | * |
Tinymux | Ubuntu | intrepid | * |
Tinymux | Ubuntu | jaunty | * |
Tinymux | Ubuntu | karmic | * |