ID

VAR-E-201511-0134


CVE

cve_id:CVE-2015-8300

Trust: 0.5

sources: PACKETSTORM: 134523

TITLE

Polycom BTOE Connector 2.3.0 Local Privilege Escalation

Trust: 0.5

sources: PACKETSTORM: 134523

DESCRIPTION

Polycom BToE Connector up to version 2.3.0 allows unprivileged windows users to execute arbitrary code with SYSTEM privileges.

Trust: 0.5

sources: PACKETSTORM: 134523

AFFECTED PRODUCTS

vendor:polycommodel:btoe connectorscope:eqversion:2.3.0

Trust: 0.5

sources: PACKETSTORM: 134523

EXPLOIT

#### Title:
Polycom BToE Connector up to version 2.3.0 allows unprivileged windows
users to execute arbitrary code with SYSTEM privileges.

#### Type of vulnerability:
Privilege Escalation
##### Exploitation vector:
local
##### Attack outcome:
Code execution with SYSTEM privileges.
#### Impact:
CVSS Base Score 6,2
CVSS v2 Vector (AV:L/AC:L/Au:S/C:C/I:C/A:N)
#### Software/Product name:
Polycom BToE Connector
#### Affected versions:
All Versions including 2.3.0

#### Fixed in version:
Version 3.0.0 (Released March 2015)

#### Vendor:
Polycom Inc.
#### CVE number:
CVE-2015-8300
#### Timeline
* `2014-12-19` identification of vulnerability
* `2015-01-01` vendor contacted via customer
* `2015-03-01` vendor released fixed version 3.0.0
* `2015-07-14` contact cve-request@mitre.

#### Credits:
Severin Winkler `swinkler@sba-research.org` (SBA Research)
Ulrich Bayer `ubayer@sba-research.org` (SBA Research)
#### References:
Download secure version 3.0.0
http://support.polycom.com/PolycomService/support/us/support/eula/ucs/UCagreement_BToE_3_0_0.html

#### Description:
The Polycom BToE Connector Version up to version 2.3.0 allows a local
user to gain
local administrator privileges.

The software creates a windows service running with SYSTEM privileges
using the following file (standard installation path):

C:\program files (x86)\polycom\polycom btoe connector\plcmbtoesrv.exe

The default installation allows everyone to replace the plcmbtoesrv.exe
file allowing unprivileged users to execute arbitrary commands on the
windows host.

#### Proof-of-concept:
*none*

Trust: 0.5

sources: PACKETSTORM: 134523

EXPLOIT HASH

LOCAL

SOURCE

md5: 8e88b51d0a676cbc7aa9fbd837f8ba3f
sha-1: a92350ba5036815f41229a8e1fec67cd0e37e8bc
sha-256: 8f7f179c0390f32c61f7e5d9ef5dff39e836b126a057fbd52f32854d89498f84
md5: 8e88b51d0a676cbc7aa9fbd837f8ba3f

Trust: 0.5

sources: PACKETSTORM: 134523

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 134523

TYPE

arbitrary

Trust: 0.5

sources: PACKETSTORM: 134523

TAGS

tag:exploit

Trust: 0.5

tag:arbitrary

Trust: 0.5

sources: PACKETSTORM: 134523

CREDITS

Ulrich Bayer, Severin Winkler

Trust: 0.5

sources: PACKETSTORM: 134523

EXTERNAL IDS

db:NVDid:CVE-2015-8300

Trust: 0.5

db:PACKETSTORMid:134523

Trust: 0.5

sources: PACKETSTORM: 134523

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2015-8300

Trust: 0.5

sources: PACKETSTORM: 134523

SOURCES

db:PACKETSTORMid:134523

LAST UPDATE DATE

2022-07-27T10:00:50.952000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:134523date:2015-11-24T14:02:22