Apple iTunes < 8.2 itms: URI Handling Overflow (uncredentialed check)

high Nessus Plugin ID 38986


The remote host contains an application that is affected by a buffer overflow vulnerability.


The version of Apple iTunes on the remote host is prior to version 8.2. It is, therefore, affected by a stack-based buffer overflow that can be triggered when parsing 'itms:' URLs. By convincing a user to click on a specially crafted link, a remote attacker can cause a denial of service or execute arbitrary code with the user's level of privileges.


Upgrade to Apple iTunes 8.2 or later.

See Also

Plugin Details

Severity: High

ID: 38986

File Name: itunes_8_2_banner.nasl

Version: 1.20

Type: remote

Published: 6/2/2009

Updated: 7/13/2018

Supported Sensors: Nessus

Risk Information


Risk Factor: High

Score: 8.9


Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:apple:itunes

Required KB Items: iTunes/sharing

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/1/2009

Vulnerability Publication Date: 6/1/2009

Exploitable With

Core Impact

Metasploit (Apple OS X iTunes 8.1.1 ITMS Overflow)

Reference Information

CVE: CVE-2009-0950

BID: 35157

CWE: 119