Package: tinymux
Version: 2.4.3.31-1
Severity: grave
Tags: security
Justification: user security hole


http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1655

Overview: Buffer overflow in the fun_ladd function in funmath.cpp in TinyMUX 
before 20070126 might allow remote 
attackers to cause a denial of service (crash) or possibly execute arbitrary 
code via unspecified vectors 
related to lists of numbers.

Fix exists in upstream release.

-- System Information:
Debian Release: 4.0
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-k7
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages tinymux depends on:
ii  libc6                       2.3.6.ds1-13 GNU C Library: Shared libraries
ii  libgcc1                     1:4.1.1-21   GCC support library
ii  libstdc++6                  4.1.1-21     The GNU Standard C++ Library v3

tinymux recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to