CVE-2026-40613

Coturn is a free open source implementation of TURN and STUN Server. Prior to 4.10.0, the STUN/TURN attribute parsing functions in coturn perform unsafe pointer casts from uint8_t * to uint16_t * without alignment checks. When processing a crafted STUN message with odd-aligned attribute boundaries, this results in misaligned memory reads at ns_turn_msg.c. On ARM64 architectures (AArch64) with strict alignment enforcement, this causes a SIGBUS signal that immediately kills the turnserver process. An unauthenticated remote attacker can crash any ARM64 coturn deployment by sending a single crafted UDP packet. This vulnerability is fixed in 4.10.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:coturn_project:coturn:*:*:*:*:*:*:*:*

History

24 Apr 2026, 13:41

Type Values Removed Values Added
First Time Coturn Project
Coturn Project coturn
References () https://github.com/coturn/coturn/security/advisories/GHSA-j662-9wcj-mf36 - () https://github.com/coturn/coturn/security/advisories/GHSA-j662-9wcj-mf36 - Exploit, Vendor Advisory
CPE cpe:2.3:a:coturn_project:coturn:*:*:*:*:*:*:*:*

21 Apr 2026, 21:16

Type Values Removed Values Added
References () https://github.com/coturn/coturn/security/advisories/GHSA-j662-9wcj-mf36 - () https://github.com/coturn/coturn/security/advisories/GHSA-j662-9wcj-mf36 -

21 Apr 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-21 19:16

Updated : 2026-04-24 13:41


NVD link : CVE-2026-40613

Mitre link : CVE-2026-40613

CVE.ORG link : CVE-2026-40613


JSON object : View

Products Affected

coturn_project

  • coturn
CWE
CWE-704

Incorrect Type Conversion or Cast