Apple iTunes < 12.5.1 Multiple Vulnerabilities (uncredentialed Check)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

An application running on the remote host is affected by multiple
vulnerabilities.

Description :

The version of Apple iTunes running on the remote Windows host is
prior to 12.5.1. It is, therefore, affected by multiple
vulnerabilities :

- A remote code execution vulnerability exists due to
improper handling of error prototypes. An
unauthenticated, remote attacker can exploit this, by
convincing a user to visit a maliciously crafted
website, to execute arbitrary code. (CVE-2016-4728)

- An information disclosure vulnerability exists in WebKit
due to a permission issue caused by improper handling of
the location variable. An unauthenticated, remote
attacker can exploit this, by convincing a user to visit
a maliciously crafted website, to disclose sensitive
information. (CVE-2016-4758)

- Multiple memory corruption errors exist in WebKit due to
improper validation of user-supplied input. An
unauthenticated, remote attacker can exploit these
issues, by convincing a user to visit a maliciously
crafted website, to cause a denial of service condition
or the execution of arbitrary code. (CVE-2016-4759,
CVE-2016-4762, CVE-2016-4764, CVE-2016-4765,
CVE-2016-4766, CVE-2016-4767, CVE-2016-4768,
CVE-2016-4769)

- A rebinding flaw exists in WebKit due to a failure to
restrict HTTP/0.9 responses to default ports and
cancel resource loads if a document is loaded with a
different HTTP protocol version. An unauthenticated,
remote attacker can exploit this, by convincing a user
to visit a maliciously crafted website, to access
non-HTTP services. (CVE-2016-4760)

- A security bypass vulnerability exists in WebKit in the
WKWebView component due to a failure to properly verify
X.509 certificates from HTTPS servers. A
man-in-the-middle attacker can exploit this, via a
specially crafted certificate, to spoof servers and
disclose or manipulate network traffic. (CVE-2016-4763)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

See also :

https://support.apple.com/en-us/HT207158
http://www.nessus.org/u?0fe85f7b

Solution :

Upgrade to Apple iTunes version 12.5.1 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now