Apple iTunes < 10.6.3 Multiple Vulnerabilities (uncredentialed check)

high Nessus Plugin ID 59498

Synopsis

The remote host contains a multimedia application that has multiple vulnerabilities.

Description

The version of Apple iTunes on the remote Windows host is prior to version 10.6.3. It is, therefore, affected by the following vulnerabilities :

- A memory corruption vulnerability exists in the WebKit component. By using a specially crafted website, an attacker can exploit this to cause a denial of service or execute arbitrary code. Note that this vulnerability was addressed on Mac OS X systems by an update for Safari and, therefore, may not necessarily affect the remote host. (CVE-2012-0672)

- Stack and heap based buffer overflow errors exist in the handling of 'm3u' playlist files. An attacker can exploit these to cause a denial of service or execute arbitrary code. (CVE-2012-0677)

Solution

Upgrade to Apple iTunes 10.6.3 or later.

See Also

http://support.apple.com/kb/HT5318

http://lists.apple.com/archives/security-announce/2012/Jun/msg00000.html

Plugin Details

Severity: High

ID: 59498

File Name: itunes_10_6_3_banner.nasl

Version: 1.15

Type: remote

Published: 6/14/2012

Updated: 7/12/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:apple:itunes

Required KB Items: iTunes/sharing

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/11/2012

Vulnerability Publication Date: 6/11/2012

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Apple iTunes 10 Extended M3U Stack Buffer Overflow)

Reference Information

CVE: CVE-2012-0672, CVE-2012-0677

BID: 53404, 53933, 54113