CVE-2024-57520

NameCVE-2024-57520
DescriptionInsecure Permissions vulnerability in asterisk v22 allows a remote attacker to execute arbitrary code via the action_createconfig function. NOTE: this is disputed by the Supplier because the impact is limited to creating empty files outside of the Asterisk product directory (aka directory traversal) and the attack can only be performed by a privileged user who has the ability to manage the configuration.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
asterisk (PTS)bullseye1:16.28.0~dfsg-0+deb11u4vulnerable
bullseye (security)1:16.28.0~dfsg-0+deb11u8vulnerable
sid1:22.6.0~dfsg+~cs6.15.60671435-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
asterisksource(unstable)1:22.3.0~dfsg+~cs6.15.60671435-1unimportant

Notes

https://gist.github.com/hyp164D1/ae76ab25acfbe263b2ed7b24b6e5c621
https://github.com/asterisk/asterisk/issues/1122
https://github.com/asterisk/asterisk/commit/d184ae428df0740da02bf7ba7d9e7a7fcb7502fd (22.3.0-rc1)
Negligible security impact

Search for package or bug name: Reporting problems