Unrated severityNVD Advisory· Published Sep 13, 2010· Updated Apr 29, 2026
CVE-2010-2952
CVE-2010-2952
Description
Apache Traffic Server before 2.0.1, and 2.1.x before 2.1.2-unstable, does not properly choose DNS source ports and transaction IDs, and does not properly use DNS query fields to validate responses, which makes it easier for man-in-the-middle attackers to poison the internal DNS cache via a crafted response.
Affected products
3cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*range: <=2.0.0
- cpe:2.3:a:apache:traffic_server:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:traffic_server:2.1.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- secunia.com/advisories/41356nvdVendor Advisory
- securitytracker.com/idnvd
- trafficserver.apache.orgnvd
- www.nth-dimension.org.uk/pub/NDSA20100830.txt.ascnvd
- www.securityfocus.com/archive/1/513598/100/0/threadednvd
- www.securityfocus.com/bid/43111nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/61721nvd
- issues.apache.org/jira/browse/TS-425nvd
News mentions
0No linked articles in our index yet.