It was discovered that coTURN allowed peers to connect and relay packets to loopback addresses in the range of 127.x.x.x. A malicious user could use this vulnerability to insert packages into the loopback interface.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "4.5.0.3-1ubuntu0.4", "binary_name": "coturn" }, { "binary_version": "4.5.0.3-1ubuntu0.4", "binary_name": "coturn-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "4.5.0.7-1ubuntu2.18.04.3", "binary_name": "coturn" }, { "binary_version": "4.5.0.7-1ubuntu2.18.04.3", "binary_name": "coturn-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "4.5.1.1-1.1ubuntu0.20.04.2", "binary_name": "coturn" }, { "binary_version": "4.5.1.1-1.1ubuntu0.20.04.2", "binary_name": "coturn-dbgsym" } ] }