Package: tinymux Severity: important Hi mate
There is a CVE[0] report which states that tinymux is vulnerable as followed: Buffer overflow in TinyMUX before 2.4 allows attackers to cause a denial of service via unspecified vectors related to "too many substring matches in a regexp $-command." NOTE: some of these details are obtained from third party information. Please also see this advisory[1], which explains that the versions prior to 2.4.3.34 are affected. Can you please invesitage this. Thanks for your efforts. Cheers Steffen [0]:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1958 [1]: http://www.frsirt.com/english/advisories/2007/1213 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]