Lucene search

K
cvelistTalosCVELIST:CVE-2020-6061
HistoryFeb 19, 2020 - 6:27 p.m.

CVE-2020-6061

2020-02-1918:27:20
talos
www.cve.org
1

7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H

9.2 High

AI Score

Confidence

High

0.009 Low

EPSS

Percentile

82.6%

An exploitable heap out-of-bounds read vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to information leaks and other misbehavior. An attacker needs to send an HTTPS request to trigger this vulnerability.

CNA Affected

[
  {
    "product": "CoTURN",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "CoTURN 4.5.1.1"
      }
    ]
  }
]

7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H

9.2 High

AI Score

Confidence

High

0.009 Low

EPSS

Percentile

82.6%