Vulnerability Description
Apache Traffic Server before 2.0.1, and 2.1.x before 2.1.2-unstable, does not properly choose DNS source ports and transaction IDs, and does not properly use DNS query fields to validate responses, which makes it easier for man-in-the-middle attackers to poison the internal DNS cache via a crafted response.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Traffic Server | <= 2.0.0 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/41356Vendor Advisory
- http://securitytracker.com/id?1024417
- http://trafficserver.apache.org/
- http://www.nth-dimension.org.uk/pub/NDSA20100830.txt.asc
- http://www.securityfocus.com/archive/1/513598/100/0/threaded
- http://www.securityfocus.com/bid/43111
- https://exchange.xforce.ibmcloud.com/vulnerabilities/61721
- https://issues.apache.org/jira/browse/TS-425
- http://secunia.com/advisories/41356Vendor Advisory
- http://securitytracker.com/id?1024417
- http://trafficserver.apache.org/
- http://www.nth-dimension.org.uk/pub/NDSA20100830.txt.asc
- http://www.securityfocus.com/archive/1/513598/100/0/threaded
- http://www.securityfocus.com/bid/43111
- https://exchange.xforce.ibmcloud.com/vulnerabilities/61721
FAQ
What is CVE-2010-2952?
CVE-2010-2952 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Apache Traffic Server before 2.0.1, and 2.1.x before 2.1.2-unstable, does not properly choose DNS source ports and transaction IDs, and does not properly use DNS query fields to validate responses, wh...
How severe is CVE-2010-2952?
CVE-2010-2952 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-2952?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Traffic Server.