TinyMUX Fun_Ladd() Buffer Overflow Vulnerability

TinyMUX is prone to a stack-based buffer-overflow vulnerability because the software fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized buffer.

An attacker can exploit this issue to crash the application and deny service to legitimate users. This issue may be leveraged to execute arbitrary code with the privileges of the application, but this has not been confirmed.

Version 2.4 is vulnerable; other versions may also be affected.


 

Privacy Statement
Copyright 2010, SecurityFocus