CVE-2020-4067

In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the connection of another client. This has been fixed in 4.5.1.3.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00010.html Mailing List Third Party Advisory
https://github.com/coturn/coturn/blob/aab60340b201d55c007bcdc853230f47aa2dfdf1/ChangeLog#L15 Release Notes
https://github.com/coturn/coturn/issues/583 Issue Tracking Third Party Advisory
https://github.com/coturn/coturn/security/advisories/GHSA-c8r8-8vp5-6gcm Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/07/msg00002.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5G35UBNSRLL6SYRTODYTMBJ65TLQILUM/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNJJO77ZLGGFJWNUGP6VDG5HPAC5UDBK/
https://usn.ubuntu.com/4415-1/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4711 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00010.html Mailing List Third Party Advisory
https://github.com/coturn/coturn/blob/aab60340b201d55c007bcdc853230f47aa2dfdf1/ChangeLog#L15 Release Notes
https://github.com/coturn/coturn/issues/583 Issue Tracking Third Party Advisory
https://github.com/coturn/coturn/security/advisories/GHSA-c8r8-8vp5-6gcm Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/07/msg00002.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5G35UBNSRLL6SYRTODYTMBJ65TLQILUM/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNJJO77ZLGGFJWNUGP6VDG5HPAC5UDBK/
https://usn.ubuntu.com/4415-1/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4711 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:coturn_project:coturn:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

Configuration 5 (hide)

cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-06-29 20:15

Updated : 2024-11-21 05:32


NVD link : CVE-2020-4067

Mitre link : CVE-2020-4067

CVE.ORG link : CVE-2020-4067


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • fedora

coturn_project

  • coturn

opensuse

  • leap

canonical

  • ubuntu_linux
CWE
CWE-665

Improper Initialization