Apache Traffic Server prior to 2.0.1, and 2.1.x prior to 2.1.2-unstable, does not properly choose DNS source ports and transaction IDs, and does not properly use DNS query fields to validate responses, which makes it easier for man-in-the-middle malicious users to poison the internal DNS cache via a crafted response.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache traffic server |
||
apache traffic server 2.1.1 |
||
apache traffic server 2.1.0 |