Apache Traffic Server Remote DNS Cache Poisoning Vulnerability

Summary
Apache Traffic Server is prone to a remote DNS cache-poisoning vulnerability. An attacker can exploit this issue to divert data from a legitimate site to an attacker-specified site. Successful exploits will allow the attacker to manipulate cache data, potentially facilitating man-in-the-middle, site-impersonation, or denial-of- service attacks. Versions prior to Apache Traffic Server 2.0.1.
Solution
Updates are available. Please see the references for more information.
References