First published: Mon Jun 29 2020(Updated: )
In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the connection of another client. This has been fixed in 4.5.1.3.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/coturn | <4.5.0.7-1ubuntu2.18.04.2 | 4.5.0.7-1ubuntu2.18.04.2 |
ubuntu/coturn | <4.5.1.1-1.1ubuntu0.19.10.1 | 4.5.1.1-1.1ubuntu0.19.10.1 |
ubuntu/coturn | <4.5.1.1-1.1ubuntu0.20.04.1 | 4.5.1.1-1.1ubuntu0.20.04.1 |
ubuntu/coturn | <4.5.1.3-1 | 4.5.1.3-1 |
ubuntu/coturn | <4.5.0.3-1ubuntu0.3 | 4.5.0.3-1ubuntu0.3 |
debian/coturn | 4.5.2-3 4.6.1-1 4.6.1-2 | |
coturn | <4.5.1.3 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 | |
Red Hat Fedora | =31 | |
Red Hat Fedora | =32 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.10 | |
Ubuntu | =20.04 | |
SUSE Linux | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-4067 has been classified as a medium severity vulnerability due to the potential for information leakage between client connections.
To fix CVE-2020-4067, upgrade to coturn version 4.5.1.3 or later.
CVE-2020-4067 affects coturn versions prior to 4.5.1.3 on Ubuntu, Debian, and Fedora systems.
CVE-2020-4067 is a vulnerability that involves the improper initialization of STUN/TURN response buffers, leading to potential information leaks.
Yes, an attacker can exploit CVE-2020-4067 remotely by querying the coturn server to access sensitive information from other client connections.