Apple iTunes < 8.2 itms: URI Handling Overflow (uncredentialed check)

High Nessus Plugin ID 38986


The remote host contains an application that is affected by a buffer overflow vulnerability.


The version of Apple iTunes on the remote host is prior to version 8.2. It is, therefore, affected by a stack-based buffer overflow that can be triggered when parsing 'itms:' URLs. By convincing a user to click on a specially crafted link, a remote attacker can cause a denial of service or execute arbitrary code with the user's level of privileges.


Upgrade to Apple iTunes 8.2 or later.

See Also

Plugin Details

Severity: High

ID: 38986

File Name: itunes_8_2_banner.nasl

Version: 1.20

Type: remote

Published: 2009/06/02

Modified: 2018/07/13

Dependencies: 20217

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apple:itunes

Required KB Items: iTunes/sharing

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/06/01

Vulnerability Publication Date: 2009/06/01

Exploitable With

Core Impact

Metasploit (Apple OS X iTunes 8.1.1 ITMS Overflow)

Reference Information

CVE: CVE-2009-0950

BID: 35157

CWE: 119