Vulnerabilities > CVE-2007-1655 - Buffer Overflow vulnerability in Tinymux 2.4
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Buffer overflow in the fun_ladd function in funmath.cpp in TinyMUX before 20070126 might allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors related to lists of numbers.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-1317.NASL |
description | duskwave discovered that tinymux, a text-based multi-user virtual world server, performs insufficient boundary checks when working with user-supplied data, which might lead to the execution of arbitrary code. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25583 |
published | 2007-06-27 |
reporter | This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/25583 |
title | Debian DSA-1317-1 : tinymux - buffer overflow |
code |
|
References
- http://code.google.com/p/tinymux/issues/detail?id=282&can=2&q=
- http://osvdb.org/34686
- http://secunia.com/advisories/24733
- http://secunia.com/advisories/25784
- http://www.debian.org/security/2007/dsa-1317
- http://www.securityfocus.com/bid/23292
- http://www.tinymux.org/changes.txt
- http://www.vupen.com/english/advisories/2007/1213