Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 24 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Coturn Project
Coturn Project coturn |
|
| CPEs | cpe:2.3:a:coturn_project:coturn:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Coturn Project
Coturn Project coturn |
Wed, 22 Apr 2026 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Coturn
Coturn coturn |
|
| Vendors & Products |
Coturn
Coturn coturn |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Coturn is a free open source implementation of TURN and STUN Server. Prior to 4.10.0, the STUN/TURN attribute parsing functions in coturn perform unsafe pointer casts from uint8_t * to uint16_t * without alignment checks. When processing a crafted STUN message with odd-aligned attribute boundaries, this results in misaligned memory reads at ns_turn_msg.c. On ARM64 architectures (AArch64) with strict alignment enforcement, this causes a SIGBUS signal that immediately kills the turnserver process. An unauthenticated remote attacker can crash any ARM64 coturn deployment by sending a single crafted UDP packet. This vulnerability is fixed in 4.10.0. | |
| Title | Coturn: Misaligned Memory Access in coturn STUN Attribute Parser (Remote DoS on ARM64) | |
| Weaknesses | CWE-704 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-21T20:36:46.136Z
Reserved: 2026-04-14T14:07:59.642Z
Link: CVE-2026-40613
Updated: 2026-04-21T19:54:42.131Z
Status : Analyzed
Published: 2026-04-21T19:16:17.743
Modified: 2026-04-24T13:41:41.893
Link: CVE-2026-40613
No data.
OpenCVE Enrichment
Updated: 2026-04-22T07:30:11Z