[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201009081522.07383.timb@nth-dimension.org.uk>
Date: Wed, 8 Sep 2010 15:22:00 +0100
From: Tim Brown <timb@...-dimension.org.uk>
To: full-disclosure@...k.org.uk, bugtraq@...urityfocus.com
Subject: Medium security flaw in Apache Traffic Server
I was recently taking a look at the Apache Traffic Server project (which I
believe was formerly developed by Yahoo Inc) and notice a series of potential
problems relating to the way that it handles DNS. This proxy does not rely on
the OS supplied resolver library for resolving hostnames but instead
implements its own asynchronous resolver.
Whilst reviewing the code, I spotted 3 potential issues which I believe might
significantly increase the chances of Traffic Server's internal DNS cache being
poisoned.
The Apache Software Foundation have assigned CVE-2010-2952 to these issues.
Tim
--
Tim Brown
<mailto:timb@...-dimension.org.uk>
<http://www.nth-dimension.org.uk/>
Download attachment "NDSA20100830.txt.asc" of type "application/pgp-signature" (5527 bytes)
Download attachment "signature.asc " of type "application/pgp-signature" (837 bytes)
Powered by blists - more mailing lists