This issue does not affect the version of Apache
httpd as supplied with Red Hat Enterprise Linux 2.1 as it does not contain the vulnerable code.
The ability to exploit this issue is dependent on the stack layout for a particular compiled version of
mod_rewrite. If the compiler has added padding to the stack immediately after the buffer being overwritten, this issue can not be exploited, and Apache
httpd will continue operating normally.
The Red Hat Security Response Team analyzed Red Hat Enterprise Linux 3 and Red Hat Enterprise Linux 4 binaries for all architectures as packaged by Red Hat and determined that these versions cannot be exploited. We therefore do not plan on providing updates for this issue.