VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-2952
traffic_server: Apache Traffic Server before 2.0.1, and 2.1.x befor...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2952

Original

Apache Traffic Server before 2.0.1, and 2.1.x before 2.1.2-unstable, does not properly choose DNS source ports and transaction IDs, and does not properly use DNS query fields to validate responses, which makes it easier for man-in-the-middle attackers to poison the internal DNS cache via a crafted response.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-09-13
Source Information Category:
Advisory, Alert
Last Updated:
2010-09-14




Affected Product Tags
cpe:/a:apache:traffic_server:2.0.0 and previous versions
cpe:/a:apache:traffic_server:2.1.0
cpe:/a:apache:traffic_server:2.1.1
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

Alternatives




References
BID 43111




BUGTRAQ 20100908 Medium security flaw in Apache Traffic Server




CONFIRM https://issues.apache.org/jira/browse/TS-425




CONFIRM http://trafficserver.apache.org/




MISC http://www.nth-dimension.org.uk/pub/NDSA20100830.txt.asc




SECTRACK 1024417




SECUNIA 41356




Vulnerability Type Input Validation (CWE-20)




XF apache-traffic-cache-poisoing(61721)





Copyright © 2010 JPCERT/CC All Rights Reserved.