VYPR
Unrated severityNVD Advisory· Published Sep 13, 2010· Updated Apr 29, 2026

CVE-2010-2952

CVE-2010-2952

Description

Apache Traffic Server before 2.0.1, and 2.1.x before 2.1.2-unstable, does not properly choose DNS source ports and transaction IDs, and does not properly use DNS query fields to validate responses, which makes it easier for man-in-the-middle attackers to poison the internal DNS cache via a crafted response.

Affected products

3
  • cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*range: <=2.0.0
    • cpe:2.3:a:apache:traffic_server:2.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apache:traffic_server:2.1.1:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.