{"vuid":"VU#213486","idnumber":"213486","name":"LifeSize Room appliance authentication bypass and arbitrary code injection vulnerability","keywords":["LifeSize Room","authentication","code injection"],"overview":"LifeSize Room appliance contains an authentication bypass and arbitrary code injection vulnerability when failing to sanitize input from unauthenticated clients.","clean_desc":"According to LifeSize's website \"LifeSize Room combines an immersive, high definition video experience with a rich set of features to deliver a powerful, flexible, and easy-to-use video communication solution.\" The LifeSize Room appliance contains an embedded web interface that allows administrative access to the appliance. This web interface fails to sanitize input from unauthenticated clients leading to an authentication bypass and possibly arbitrary code injection. Using a proxy tool to intercept traffic between the attacker and the LifeSize Room appliance web interface, an unauthenticated attacker makes a request to the gateway.php web page that references the LSRoom_Remoting.authenticate function. The attacker can modify the Action Message Format (AMF) data in the response from the server, changing the value from \"false\" to \"true\" allowing the attacker to bypass the appliance web interface authentication. An additional vulnerability exists when an unauthenticated attacker makes a request to the gateway.php web page that references the LSRoom_Remoting.doCommand function. Using a proxy tool to intercept traffic between the attacker and the LifeSize Room appliance system web interface, the attacker can modify the AMF data in the original parameter \"pref -l /var/system/upgrade/status\" in the vulnerable LSRoom_Remoting.doCommand function to be an arbitrary command that will run with the permission of the webserver. According to the vulnerability reporter LifeSize Room LS_RM1_3.5.3 (11) and 4.7.18 is vulnerable, and possibly other versions.","impact":"A remote, unauthenticated attacker can bypass the authentication of the administrative web interface and possibly inject arbitrary code in the administrative system web interface.","resolution":"Update Logitech has stated that this vulnerability has been addressed in the latest firmware. Depending on the affected LifeSize Room appliance model the fixed versions are: 4.7.19, 4.8.1, and 4.8.6.","workarounds":"Restrict network access Restrict network access to the LifeSize Room appliance administrative interface and other devices using open protocols like HTTP (tcp/80) or HTTPS (tcp/443).","sysaffected":"","thanks":"Thanks to Spencer McIntyre of SecureState for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["h","t","t","p",":","/","/","w","w","w",".","s","e","c","u","r","e","s","t","a","t","e",".","c","o","m","/","D","o","c","u","m","e","n","t","s","/","L","i","f","e","S","i","z","e","_","R","o","o","m","_","A","d","v","i","s","o","r","y",".","t","x","t"],"cveids":["CVE-2011-2762","CVE-2011-2763"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-07-18T18:41:42Z","publicdate":"2011-08-29T00:00:00Z","datefirstpublished":"2011-08-29T18:50:47Z","dateupdated":"2011-10-19T12:25:14Z","revision":27,"vrda_d1_directreport":"1","vrda_d1_population":"1","vrda_d1_impact":"3","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"4","cam_impact":"17","cam_easeofexploitation":"14","cam_attackeraccessrequired":"19","cam_scorecurrent":"1.3566","cam_scorecurrentwidelyknown":"7.80045","cam_scorecurrentwidelyknownexploited":"14.58345","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.3566,"vulnote":null}