Package: tinymux
Severity: important

Hi mate

There is a CVE[0] report which states that tinymux is vulnerable as
followed:

Buffer overflow in TinyMUX before 2.4 allows attackers to cause a denial
of service via unspecified vectors related to "too many substring
matches in a regexp $-command." NOTE: some of these details are obtained
from third party information.

Please also see this advisory[1], which explains that the versions prior
to 2.4.3.34 are affected.

Can you please invesitage this.
Thanks for your efforts.

Cheers
Steffen

[0]:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1958

[1]: http://www.frsirt.com/english/advisories/2007/1213


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to