Polycom HDX < 3.1.1.2 Multiple Vulnerabilities

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The host is affected by multiple vulnerabilities.

Description :

According to its self-reported version number, the firmware installed
on the remote host is affected by multiple vulnerabilities :

- A command shell authorization bypass vulnerability
exists that could be used by a malicious user to gain
unauthorized access to the system, which could result
in information disclosure.

- A command injection vulnerability exists that could
allow an authenticated, malicious user to execute
arbitrary commands on the system when using the
firmware update functionality.

- A privilege escalation vulnerability exists that could
lead to unauthorized system access and information
disclosure.

- An H.323 format string vulnerability exists via a
maliciously crafted call setup message that could lead
to system instability or remote code execution.

- A SQL injection vulnerability exists via a maliciously
crafted call setup message that could lead to remote
code execution.

- The Polycom HDX uses a software update process that
reads a PUP file containing all of the information and
tools needed to properly update the system. A
vulnerability has been discovered in the PUP file header
MAC signature verification process that could allow a
malicious user to extract the components of the PUP
file.

Note that Nessus has not tested for the issues but has instead relied
only on the application's self-reported version number.

See also :

http://www.nessus.org/u?526eb560
http://www.nessus.org/u?89cd66e6
http://www.nessus.org/u?08be6b0c
http://www.nessus.org/u?21e1a2ea
http://www.nessus.org/u?3131f5cd
http://www.nessus.org/u?b7c3ce18
http://www.nessus.org/u?056cdac1
http://www.nessus.org/u?9af53a8d
http://www.nessus.org/u?14d6b068
http://www.nessus.org/u?541b72b3
http://www.nessus.org/u?e71e0b93

Solution :

Upgrade the firmware to version 3.1.1.2 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 9.5
(CVSS2#E:F/RL:U/RC:C)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 70068 ()

Bugtraq ID: 57911
58523
58524
58525
58526

CVE ID: