CVE-2007-1958
Published: 11 April 2007
Buffer overflow in TinyMUX before 2.4 allows attackers to cause a denial of service via unspecified vectors related to "too many substring matches in a regexp $-command." NOTE: some of these details are obtained from third party information.
Priority
Status
Package | Release | Status |
---|---|---|
tinymux Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
edgy |
Ignored
(end of life, was needed)
|
|
feisty |
Released
(2.4.3.31-1)
|
|
gutsy |
Released
(2.4.3.31-1)
|
|
hardy |
Released
(2.4.3.31-1)
|
|
intrepid |
Released
(2.4.3.31-1)
|
|
jaunty |
Released
(2.4.3.31-1)
|
|
karmic |
Released
(2.4.3.31-1)
|
|
upstream |
Needs triage
|