Coturn is a free open source implementation of TURN and STUN Server. Prior to 4.10.0, the STUN/TURN attribute parsing functions in coturn perform unsafe pointer casts from uint8_t * to uint16_t * without alignment checks. When processing a crafted STUN message with odd-aligned attribute boundaries, this results in misaligned memory reads at ns_turn_msg.c. On ARM64 architectures (AArch64) with strict alignment enforcement, this causes a SIGBUS signal that immediately kills the turnserver process. An unauthenticated remote attacker can crash any ARM64 coturn deployment by sending a single crafted UDP packet. This vulnerability is fixed in 4.10.0.
References
| Link | Resource |
|---|---|
| https://github.com/coturn/coturn/security/advisories/GHSA-j662-9wcj-mf36 | Exploit Vendor Advisory |
| https://github.com/coturn/coturn/security/advisories/GHSA-j662-9wcj-mf36 | Exploit Vendor Advisory |
Configurations
History
24 Apr 2026, 13:41
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Coturn Project
Coturn Project coturn |
|
| References | () https://github.com/coturn/coturn/security/advisories/GHSA-j662-9wcj-mf36 - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:coturn_project:coturn:*:*:*:*:*:*:*:* |
21 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/coturn/coturn/security/advisories/GHSA-j662-9wcj-mf36 - |
21 Apr 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-21 19:16
Updated : 2026-04-24 13:41
NVD link : CVE-2026-40613
Mitre link : CVE-2026-40613
CVE.ORG link : CVE-2026-40613
JSON object : View
Products Affected
coturn_project
- coturn
CWE
CWE-704
Incorrect Type Conversion or Cast
