This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.
The remote host contains a multimedia application that has multiple
The version of iTunes on the remote host is prior to version 11.1.4.
It is, therefore, affected by multiple vulnerabilities :
- The included versions of the WebKit, libxml, and libxslt
components in iTunes contain several errors that can
lead to memory corruption and arbitrary code execution.
The vendor states that one possible vector is a man-in-
the-middle attack while the application browses the
'iTunes Store'. Please note that these vulnerabilities
only affect the application when it is running on a
Windows host. (CVE-2011-3102, CVE-2012-0841,
CVE-2012-2807, CVE-2012-2825, CVE-2012-2870,
CVE-2012-2871, CVE-2012-5134, CVE-2013-1037,
CVE-2013-1038, CVE-2013-1039, CVE-2013-1040,
CVE-2013-1041, CVE-2013-1042, CVE-2013-1043,
CVE-2013-1044, CVE-2013-1045, CVE-2013-1046,
CVE-2013-1047, CVE-2013-2842, CVE-2013-5125,
CVE-2013-5126, CVE-2013-5127, CVE-2013-5128)
- An uninitialized memory access error exists in the
handling of text tracks. By using a specially crafted
movie file, a remote attacker can exploit this to cause
a denial of service or execute arbitrary code.
- An error exists related to the iTunes Tutorials window
that can allow an attacker in a privileged network
location to inject content. Note that this vulnerability
only affects the application installed on a Mac OS X
See also :
Upgrade to iTunes 11.1.4 or later.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : false
Family: Peer-To-Peer File Sharing
Nessus Plugin ID: 72105 ()
CVE ID: CVE-2011-3102