Linux Security
    Linux Security
    Linux Security

    ArchLinux: 202101-21: coturn: insufficient validation

    Date 15 Jan 2021
    313
    Posted By LinuxSecurity Advisories
    The package coturn before version 4.5.2-1 is vulnerable to insufficient validation.
    Arch Linux Security Advisory ASA-202101-21
    ==========================================
    
    Severity: High
    Date    : 2021-01-12
    CVE-ID  : CVE-2020-26262
    Package : coturn
    Type    : insufficient validation
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-1430
    
    Summary
    =======
    
    The package coturn before version 4.5.2-1 is vulnerable to insufficient
    validation.
    
    Resolution
    ==========
    
    Upgrade to 4.5.2-1.
    
    # pacman -Syu "coturn>=4.5.2-1"
    
    The problem has been fixed upstream in version 4.5.2.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    A security issue was found in coturn before version 4.5.2. By default
    coturn does not allow peers to connect and relay packets to loopback
    addresses in the range of 127.x.x.x. However, it was observed that when
    sending a CONNECT request with the XOR-PEER-ADDRESS value of 0.0.0.0, a
    successful response was received and subsequently, CONNECTIONBIND also
    received a successful response. Coturn then is able to relay packets to
    the loopback interface. Additionally, when coturn is listening on IPv6,
    which is default, the loopback interface can also be reached by making
    use of either [::1] or [::] as the peer address.
    
    Impact
    ======
    
    A malicious attacker might relay packets to the loopback interface due
    to insufficient validation of the connection.
    
    References
    ==========
    
    https://github.com/coturn/coturn/security/advisories/GHSA-6g6j-r9rf-cm7p
    https://github.com/coturn/coturn/commit/ff5e5478a3e1b426bad053828099403cfc5c1f5f
    https://github.com/coturn/coturn/commit/af50d63a152cd9505d38f02bc552848748805e7b
    https://github.com/coturn/coturn/commit/6c774b9fb8d9d76576ece10a6429172ed3800466
    https://github.com/coturn/coturn/commit/560684c894498285f9e4271f3c924ebf01f36307
    https://github.com/coturn/coturn/commit/649cbf966181846ecdd7847e4543dd287a78d295
    https://github.com/coturn/coturn/commit/9c7deff4b8ed8c323c87b9ede75481bd6bc3154d
    https://github.com/coturn/coturn/commit/dd0ffdb51a4cddaf1d6662079fa91f6f32bd26a8
    https://github.com/coturn/coturn/commit/d84028b6dbc9eb7d3f8828ec37ae02a0963257b6
    https://security.archlinux.org/CVE-2020-26262
    

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/49-tis-the-season-of-giving-how-have-you-given-back-to-the-open-source-community?task=poll.vote&format=json
    49
    radio
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"22","type":"x","order":"1","pct":34.92,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"13","type":"x","order":"2","pct":20.63,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"28","type":"x","order":"3","pct":44.44,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.