Buffer overflow in TinyMUX before 2.4 allows attackers to cause a denial of service via unspecified vectors related to "too many substring matches in a regexp $-command." NOTE: some of these details are obtained from third party information.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2007/1213 | vdb entry |
http://www.tinymux.org/changes.txt |