Apache Traffic Server before 2.0.1, and 2.1.x before 2.1.2-unstable, does not properly choose DNS source ports and transaction IDs, and does not properly use DNS query fields to validate responses, which makes it easier for man-in-the-middle attackers to poison the internal DNS cache via a crafted response.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/43111 | vdb entry |
https://issues.apache.org/jira/browse/TS-425 | |
http://secunia.com/advisories/41356 | third party advisory vendor advisory |
http://www.nth-dimension.org.uk/pub/NDSA20100830.txt.asc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/61721 | vdb entry |
http://securitytracker.com/id?1024417 | vdb entry |
http://trafficserver.apache.org/ | |
http://www.securityfocus.com/archive/1/513598/100/0/threaded | mailing list |