The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Ubuntu:20.04
coturn
to version 4.5.1.1-1.1ubuntu0.20.04.2 or higher.
Note: Versions mentioned in the description apply only to the upstream coturn
package and not the coturn
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:20.04
relevant fixed versions and status.
Coturn is free open source implementation of TURN and STUN Server. Coturn before version 4.5.2 by default does not allow peers to connect and relay packets to loopback addresses in the range of 127.x.x.x
. However, it was observed that when sending a CONNECT
request with the XOR-PEER-ADDRESS
value of 0.0.0.0
, a successful response was received and subsequently, CONNECTIONBIND
also received a successful response. Coturn then is able to relay packets to the loopback interface. Additionally, when coturn is listening on IPv6, which is default, the loopback interface can also be reached by making use of either [::1]
or [::]
as the peer address. By using the address 0.0.0.0
as the peer address, a malicious user will be able to relay packets to the loopback interface, unless --denied-peer-ip=0.0.0.0
(or similar) has been specified. Since the default configuration implies that loopback peers are not allowed, coturn administrators may choose to not set the denied-peer-ip
setting. The issue patched in version 4.5.2. As a workaround the addresses in the address block 0.0.0.0/8
, [::1]
and [::]
should be denied by default unless --allow-loopback-peers
has been specified.