|
Full Disclosure
mailing list archives
Medium security flaw in Apache Traffic Server
From: Tim Brown <timb () nth-dimension org uk>
Date: Wed, 8 Sep 2010 15:25:17 +0100
I was recently taking a look at the Apache Traffic Server project (which I
believe was formerly developed by Yahoo Inc) and notice a series of potential
problems relating to the way that it handles DNS. This proxy does not rely on
the OS supplied resolver library for resolving hostnames but instead
implements its own asynchronous resolver.
Whilst reviewing the code, I spotted 3 potential issues which I believe might
significantly increase the chances of Traffic Server's internal DNS cache being
poisoned.
The Apache Software Foundation have assigned CVE-2010-2952 to these issues.
Tim
--
Tim Brown
<mailto:timb () nth-dimension org uk>
<http://www.nth-dimension.org.uk/>
Attachment:
signature.asc
Description: This is a digitally signed message part.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
- Medium security flaw in Apache Traffic Server Tim Brown (Sep 08)
|