How to Buy
This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.
The remote host contains a multimedia application that has multiple
The version of Apple iTunes on the remote host is prior to version
11.1.2. It is, therefore, affected by multiple vulnerabilities :
- An uninitialized memory access error exists in the
handling of text tracks. By using a specially crafted
movie file, a remote attacker can exploit this to cause
a denial of service or execute arbitrary code.
- The included versions of the WebKit, libxml, and libxslt
components in iTunes contain several errors that can
lead to memory corruption and arbitrary code execution.
The vendor states that one possible vector is a man-in-
the-middle attack while the application browses the
(CVE-2011-3102, CVE-2012-0841, CVE-2012-2807,
CVE-2012-2825, CVE-2012-2870, CVE-2012-2871,
CVE-2012-5134, CVE-2013-1037, CVE-2013-1038,
CVE-2013-1039, CVE-2013-1040, CVE-2013-1041,
CVE-2013-1042, CVE-2013-1043, CVE-2013-1044,
CVE-2013-1045, CVE-2013-1046, CVE-2013-1047,
CVE-2013-2842, CVE-2013-5125, CVE-2013-5126,
See also :
Upgrade to Apple iTunes 11.1.2 or later.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : false
Family: Peer-To-Peer File Sharing
Nessus Plugin ID: 70589 ()
Bugtraq ID: 5210753540542035471855331566846006760368625516255362554625566255762558625596256062563625656256762568625696257062571
CVE ID: CVE-2011-3102CVE-2012-0841CVE-2012-2807CVE-2012-2825CVE-2012-2870CVE-2012-2871CVE-2012-5134CVE-2013-1024CVE-2013-1037CVE-2013-1038CVE-2013-1039CVE-2013-1040CVE-2013-1041CVE-2013-1042CVE-2013-1043CVE-2013-1044CVE-2013-1045CVE-2013-1046CVE-2013-1047CVE-2013-2842CVE-2013-5125CVE-2013-5126CVE-2013-5127CVE-2013-5128
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.