Buffer overflow in TinyMUX before 2.4 allows attackers to cause a denial of service via unspecified vectors related to too many substring matches in a regexp $-command. NOTE: some of these details are obtained from third party information.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tinymux | Tinymux | * | 2.3 (including) |