Red Hat Inc. Information for VU#104555

Buffer Overflow in mod_ssl

Status

Affected

Vendor Statement

A number of Red Hat products included mod_ssl packages vulnerable to this issue. Updated packages are available along with our advisories at the URLs below. Users of the Red Hat Network can update their systems using the 'up2date' tool.

Red Hat Linux:
http://rhn.redhat.com/errata/RHSA-2002-134.html
Red Hat Enterprise Linux:
http://rhn.redhat.com/errata/RHSA-2002-136.html
Stronghold 3:
http://rhn.redhat.com/errata/RHSA-2002-164.html
Stronghold 4 (cross-platform):
http://rhn.redhat.com/errata/RHSA-2002-146.html

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

None

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.