Sicherheit: Zwei Probleme in coturn
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in coturn
ID: FEDORA-2020-305c173af8
Distribution: Fedora
Plattformen: Fedora 31
Datum: Mi, 1. April 2020, 07:33
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6062
Applikationen: coturn


Fedora Update Notification
2020-04-01 01:54:46.133239

Name : coturn
Product : Fedora 31
Version :
Release : 3.fc31
URL : https://github.com/coturn/coturn/
Summary : TURN/STUN & ICE Server
Description :
The Coturn TURN Server is a VoIP media traffic NAT traversal server and
It can be used as a general-purpose network traffic TURN server/gateway, too.

This implementation also includes some extra features. Supported RFCs:

TURN specs:
- RFC 5766 - base TURN specs
- RFC 6062 - TCP relaying TURN extension
- RFC 6156 - IPv6 extension for TURN
- Experimental DTLS support as client protocol.

STUN specs:
- RFC 3489 - "classic" STUN
- RFC 5389 - base "new" STUN specs
- RFC 5769 - test vectors for STUN protocol testing
- RFC 5780 - NAT behavior discovery support

The implementation fully supports the following client-to-TURN-server
- UDP (per RFC 5766)
- TCP (per RFC 5766 and RFC 6062)
- TLS (per RFC 5766 and RFC 6062); TLS1.0/TLS1.1/TLS1.2
- DTLS (experimental non-standard feature)

Supported relay protocols:
- UDP (per RFC 5766)
- TCP (per RFC 6062)

Supported user databases (for user repository, with passwords or keys, if
authentication is required):
- SQLite
- PostgreSQL
- Redis

Redis can also be used for status and statistics storage and notification.

Supported TURN authentication mechanisms:
- long-term
- TURN REST API (a modification of the long-term mechanism, for time-limited
secret-based authentication, for WebRTC applications)

The load balancing can be implemented with the following tools (either one or a
combination of them):
- network load-balancer server
- DNS-based load balancing
- built-in ALTERNATE-SERVER mechanism.

Update Information:

* An exploitable heap overflow vulnerability exists in the way CoTURN
web server parses POST requests. A specially crafted HTTP POST request can lead
to information leaks and other misbehavior. * An exploitable
vulnerability exists in the way CoTURN web server parses POST requests.
A specially crafted HTTP POST request can lead to server crash and denial of

* Mon Mar 23 2020 Robert Scheck <robert@fedoraproject.org> -
- Added upstream patch for CVE-2020-6061 (#1816159)
- Backported upstream patch for CVE-2020-6062 (#1816163)
* Tue Jan 28 2020 Fedora Release Engineering <releng@fedoraproject.org> -
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild

[ 1 ] Bug #1816159 - CVE-2020-6061 coturn: specially crafted HTTP POST
request can lead to heap overflow which can result in information leak
[ 2 ] Bug #1816163 - CVE-2020-6062 coturn: specially crafted HTTP POST
request can lead to server crash and denial of service

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-305c173af8' at the command
line. For more information, refer to the dnf documentation available at

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux @Facebook
Neue Nachrichten