CVE-2018-4058

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-4058
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-4058.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-4058
Related
Published
2019-03-21T16:00:54Z
Modified
2024-11-21T04:06:39Z
Severity
  • 7.7 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

An exploitable unsafe default configuration vulnerability exists in the TURN server functionality of coTURN prior to 4.5.0.9. By default, the TURN server allows relaying external traffic to the loopback interface of its own host. This can provide access to other private services running on that host, which can lead to further attacks. An attacker can set up a relay with a loopback address as the peer on an affected TURN server to trigger this vulnerability.

References

Affected packages

Debian:11 / coturn

Package

Name
coturn
Purl
pkg:deb/debian/coturn?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.1.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / coturn

Package

Name
coturn
Purl
pkg:deb/debian/coturn?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.1.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / coturn

Package

Name
coturn
Purl
pkg:deb/debian/coturn?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.1.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}