Buffer overflow in TinyMUX before 2.4 allows attackers to cause a denial of service via unspecified vectors related to "too many substring matches in a regexp $-command." NOTE: some of these details are obtained from third party information.
References
Configurations
Information
Published : 2007-04-11 03:19
Updated : 2011-03-07 18:53
NVD link : CVE-2007-1958
Mitre link : CVE-2007-1958
JSON object : View
CWE
Products Affected
tinymux
- tinymux


