This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.
The remote host contains a multimedia application that has multiple
The version of Apple iTunes on the remote host is prior to version
11.1.4. It is, therefore, affected by multiple vulnerabilities :
- The included versions of the WebKit, libxml, and libxslt
components in iTunes contain several errors that can
lead to memory corruption and arbitrary code execution.
The vendor states that one possible vector is a man-in-
the-middle attack while the application browses the
'iTunes Store'. Please note that these vulnerabilities
only affect the application when it is running on a
Windows host. (CVE-2011-3102, CVE-2012-0841,
CVE-2012-2807, CVE-2012-2825, CVE-2012-2870,
CVE-2012-2871, CVE-2012-5134, CVE-2013-1037,
CVE-2013-1038, CVE-2013-1039, CVE-2013-1040,
CVE-2013-1041, CVE-2013-1042, CVE-2013-1043,
CVE-2013-1044, CVE-2013-1045, CVE-2013-1046,
CVE-2013-1047, CVE-2013-2842, CVE-2013-5125,
CVE-2013-5126, CVE-2013-5127, CVE-2013-5128)
- An uninitialized memory access error exists in the
handling of text tracks. By using a specially crafted
movie file, a remote attacker can exploit this to cause
a denial of service or execute arbitrary code.
- An error exists related to the iTunes Tutorials window
that can allow an attacker in a privileged network
location to inject content. Note that this vulnerability
only affects the application installed on a Mac OS X
See also :
Upgrade to Apple iTunes 11.1.4 or later.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : false
Family: Peer-To-Peer File Sharing
Nessus Plugin ID: 72105 ()
Bugtraq ID: 521075354054203547185533156684600676036862551625536255462556625576255862559625606256362565625676256862569625706257165088
CVE ID: CVE-2011-3102CVE-2012-0841CVE-2012-2807CVE-2012-2825CVE-2012-2870CVE-2012-2871CVE-2012-5134CVE-2013-1024CVE-2013-1037CVE-2013-1038CVE-2013-1039CVE-2013-1040CVE-2013-1041CVE-2013-1042CVE-2013-1043CVE-2013-1044CVE-2013-1045CVE-2013-1046CVE-2013-1047CVE-2013-2842CVE-2013-5125CVE-2013-5126CVE-2013-5127CVE-2013-5128CVE-2014-1242
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.