Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-4067

Опубликовано: 29 июн. 2020
Источник: debian
EPSS Низкий

Описание

In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the connection of another client. This has been fixed in 4.5.1.3.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
coturnfixed4.5.1.3-1package

Примечания

  • https://github.com/coturn/coturn/security/advisories/GHSA-c8r8-8vp5-6gcm

  • https://github.com/coturn/coturn/commit/170da1140797748ae85565b5a93a2e35e7b07b6a

EPSS

Процентиль: 78%
0.01104
Низкий

Связанные уязвимости

CVSS3: 7
ubuntu
больше 5 лет назад

In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the connection of another client. This has been fixed in 4.5.1.3.

CVSS3: 7
nvd
больше 5 лет назад

In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the connection of another client. This has been fixed in 4.5.1.3.

suse-cvrf
больше 5 лет назад

Security update for coturn

CVSS3: 7.5
fstec
больше 5 лет назад

Уязвимость буфера ответа STUN/TURN веб-сервера Coturn, позволяющая нарушителю получить доступ к конфиденциальным данным

EPSS

Процентиль: 78%
0.01104
Низкий