CVE-2026-27624

HIGH
中文标题:
(暂无数据)
英文标题:
Coturn: IPv4-mapped IPv6 (::ffff:0:0/96) bypasses denied-peer-ip ACL
CVSS分数: 7.2
发布时间: 2026-02-25 04:04:17
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v3
漏洞描述
中文描述:

(暂无数据)

英文描述:

Coturn is a free open source implementation of TURN and STUN Server. Coturn is commonly configured to block loopback and internal ranges using "denied-peer-ip" and/or default loopback restrictions. CVE-2020-26262 addressed bypasses involving "0.0.0.0", "[::1]" and "[::]", but IPv4-mapped IPv6 is not covered. When sending a "CreatePermission" or "ChannelBind" request with the "XOR-PEER-ADDRESS" value of "::ffff:127.0.0.1", a successful response is received, even though "127.0.0.0/8" is blocked via "denied-peer-ip". The root cause is that, prior to the updated fix implemented in version 4.9.0, three functions in "src/client/ns_turn_ioaddr.c" do not check "IN6_IS_ADDR_V4MAPPED". "ioa_addr_is_loopback()" checks "127.x.x.x" (AF_INET) and "::1" (AF_INET6), but not "::ffff:127.0.0.1." "ioa_addr_is_zero()" checks "0.0.0.0" and "::", but not "::ffff:0.0.0.0." "addr_less_eq()" used by "ioa_addr_in_range()" for "denied-peer-ip" matching: when the range is AF_INET and the peer is AF_INET6, the comparison returns 0 without extracting the embedded IPv4. Version 4.9.0 contains an updated fix to address the bypass of the fix for CVE-2020-26262.

CWE类型:
CWE-284 CWE-441
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
coturn coturn < 4.9.0 - - cpe:2.3:a:coturn:coturn:<_4.9.0:*:*:*:*:*:*:*
coturn_project coturn * - - cpe:2.3:a:coturn_project:coturn:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/coturn/coturn/security/advisories/GHSA-j8mm-mpf8-gvjg x_refsource_CONFIRM
cve.org
访问
https://github.com/coturn/coturn/security/advisories/GHSA-6g6j-r9rf-cm7p x_refsource_MISC
cve.org
访问
https://github.com/coturn/coturn/commit/b80eb898ba26552600770162c26a8ae7f3661b0b x_refsource_MISC
cve.org
访问
CVSS评分详情
3.1 (cna)
HIGH
7.2
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
机密性
LOW
完整性
LOW
可用性
NONE
时间信息
发布时间:
2026-02-25 04:04:17
修改时间:
2026-02-25 15:09:21
创建时间:
2026-02-26 06:00:01
更新时间:
2026-02-28 06:00:02
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2026-27624 2026-02-26 03:19:54 2026-02-25 22:00:01
NVD nvd_CVE-2026-27624 2026-02-26 02:00:04 2026-02-25 22:00:04
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
v3 NVD
2026-02-28 06:00:02
affected_products_count: 1 → 2
查看详细变更
  • affected_products_count: 1 -> 2
v2 NVD
2026-02-26 06:00:04
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']