Red Hat Inc. Information for VU#549142
Apache mod_alias vulnerable to buffer overflow via crafted regular expression
- Vendor Information Help Date Notified:
- Statement Date:
- Date Updated: 02 Feb 2004
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Red Hat, Inc. has published the following Red Hat Security Advisories in response to this issue:
Users are encouraged to review the information provided in these advisories and apply the patches they refer to.
If you have feedback, comments, or additional information about this vulnerability, please send us email.