First published: Mon Sep 13 2010(Updated: )
Apache Traffic Server before 2.0.1, and 2.1.x before 2.1.2-unstable, does not properly choose DNS source ports and transaction IDs, and does not properly use DNS query fields to validate responses, which makes it easier for man-in-the-middle attackers to poison the internal DNS cache via a crafted response.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Traffic Server | =2.1.1 | |
Apache Traffic Server | =2.1.0 | |
Apache Traffic Server | <=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2952 is considered a high severity vulnerability due to its potential to allow man-in-the-middle attacks.
To fix CVE-2010-2952, upgrade to Apache Traffic Server version 2.1.2-unstable or later.
CVE-2010-2952 affects Apache Traffic Server versions 2.0.0 and earlier, as well as 2.1.0 and 2.1.1.
CVE-2010-2952 allows attackers to conduct DNS cache poisoning attacks.
While CVE-2010-2952 is an older vulnerability, it remains relevant for systems still using affected versions of Apache Traffic Server.