This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote host contains an application that is affected by multiple
The version of Apple iTunes running on the remote host is prior to
version 11.2. It is, therefore, affected by multiple vulnerabilities :
- A flaw exists in the CFNetwork HTTPProtocol due to a
failure to properly ensure that a Set-Cookie HTTP header
is complete before interpreting the header's value. A
man-in-the-middle attacker can exploit this to bypass
security settings by closing the connection before the
security settings are sent, resulting in the disclosure
of sensitive information. (CVE-2014-1296)
- A memory corruption issue exists due to improper
validation of user-supplied input when handling MP4
files. An attacker can exploit this, by convincing a
user to open a specially crafted MP4 file, to corrupt
memory, resulting in the execution of arbitrary code.
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.
See also :
Upgrade to Apple iTunes 11.2 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false
Family: Peer-To-Peer File Sharing
Nessus Plugin ID: 74041 ()
Bugtraq ID: 67024
CVE ID: CVE-2014-1296CVE-2014-8842
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.