Apache Software Foundation Information for VU#549142
Apache mod_alias vulnerable to buffer overflow via crafted regular expression
- Vendor Information Help Date Notified:
- Statement Date:
- Date Updated: 02 Feb 2004
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The Apache Software Foundation has released versions 1.3.29 and 2.0.48 of the Apache httpd server in response to this issue. These patched versions of the software are available at:
Because this software is commonly repackaged by third-party vendors, users are encouraged to review the Systems Affected section of VU#434566 first to determine whether their vendor has produced an update for their systems.
Users who compile the Apache httpd software from source code are encouraged to upgrade to one of the patched versions listed above (or newer). Users are also encouraged to verify the PGP signatures on the software distribution before compiling and installing it on their systems.
If you have feedback, comments, or additional information about this vulnerability, please send us email.