Upstream information
Description
In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the connection of another client. This has been fixed in 4.5.1.3.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 5 |
Vector | AV:N/AC:L/Au:N/C:P/I:N/A:N |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
National Vulnerability Database | |
---|---|
Base Score | 7 |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L |
Attack Vector | Network |
Attack Complexity | High |
Privileges Required | None |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | High |
Integrity Impact | Low |
Availability Impact | Low |
CVSSv3 Version | 3.1 |
SUSE Security Advisories:
- openSUSE-SU-2020:0937-1, published Thu Dec 7 12:55:40 2023
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
openSUSE Leap 15.2 |
| Patchnames: openSUSE-2020-937 |
openSUSE Tumbleweed |
| Patchnames: openSUSE-Tumbleweed-2024-10696 |
SUSE Timeline for this CVE
CVE page created: Mon Jun 29 18:31:30 2020CVE page last modified: Sun Jun 16 00:54:47 2024