{"id":"CVE-2020-6061","details":"An exploitable heap out-of-bounds read vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to information leaks and other misbehavior. An attacker needs to send an HTTPS request to trigger this vulnerability.","modified":"2026-04-10T04:27:48.134696Z","published":"2020-02-19T19:15:12.147Z","related":["MGASA-2020-0254","openSUSE-SU-2024:10696-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OUVZRXW5ZIGWVKOLF3NPXRPP74YX7BUY/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XN2NK6FT7AMW5UIZNXDNHKEAYWAUMGSF/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQZZPI34LAS3SFNW6Z2ZJ46RKVGEODNA/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4415-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4711"},{"type":"EVIDENCE","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2020-0984"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/coturn/coturn","events":[{"introduced":"0"},{"last_affected":"952c2f6e7e9430558f2c25909997bf611783a98c"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.5.1.1"}]}}],"versions":["upstream/4.0.0.0","upstream/4.0.0.1","upstream/4.0.0.2","upstream/4.0.1.2","upstream/4.0.1.3","upstream/4.1.0.1","upstream/4.1.0.2","upstream/4.1.1.1","upstream/4.1.2.1","upstream/4.2.1.2","upstream/4.2.2.2","upstream/4.2.3.1","upstream/4.3.1.1","upstream/4.3.1.2","upstream/4.3.1.3","upstream/4.3.2.1","upstream/4.3.2.2","upstream/4.3.3.1","upstream/4.4.1.1","upstream/4.4.1.2","upstream/4.4.2.1","upstream/4.4.2.2","upstream/4.4.2.3","upstream/4.4.4.1","upstream/4.4.4.2","upstream/4.4.5.1","upstream/4.4.5.2","upstream/4.4.5.3","upstream/4.4.5.4","upstream/4.5.0.1","upstream/4.5.0.2","upstream/4.5.0.3","upstream/4.5.0.4","upstream/4.5.0.5","upstream/4.5.0.6","upstream/4.5.0.7","upstream/4.5.0.8","upstream/4.5.1.0","upstream/4.5.1.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-6061.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.10"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}