Vulnerability CVE-2010-2952


Published: 2010-09-13   Modified: 2012-02-13

Description:
Apache Traffic Server before 2.0.1, and 2.1.x before 2.1.2-unstable, does not properly choose DNS source ports and transaction IDs, and does not properly use DNS query fields to validate responses, which makes it easier for man-in-the-middle attackers to poison the internal DNS cache via a crafted response.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Apache Traffic Server 2.0.0 issue
Tim Brown
15.09.2010

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Apache -> Traffic server 

 References:
http://securitytracker.com/id?1024417
http://trafficserver.apache.org/
http://www.nth-dimension.org.uk/pub/NDSA20100830.txt.asc
http://www.securityfocus.com/archive/1/513598/100/0/threaded
http://www.securityfocus.com/bid/43111
https://exchange.xforce.ibmcloud.com/vulnerabilities/61721
https://issues.apache.org/jira/browse/TS-425

Copyright 2024, cxsecurity.com

 

Back to Top