iTunes < 10.5.1 Update Authenticity Verification Weakness (Mac OS X)

Medium Nessus Plugin ID 56871


The remote host contains an application that is susceptible to a man-in-the-middle attack.


The version of iTunes installed on the remote Mac OS X host is earlier than 10.5.1. As such, it uses an unsecured HTTP connection when checking for or retrieving software updates, which could allow a man-in-the-middle attacker to provide a Trojan horse update that appears to originate from Apple.


Upgrade to iTunes 10.5.1 or later.

See Also

Plugin Details

Severity: Medium

ID: 56871

File Name: macosx_itunes_10_5_1.nasl

Version: $Revision: 1.7 $

Type: local

Agent: macosx

Published: 2011/11/18

Modified: 2017/05/10

Dependencies: 25997

Risk Information

Risk Factor: Medium


Base Score: 5.1

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C


Base Score: 5.6

Temporal Score: 5.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apple:itunes

Required KB Items: Host/MacOSX/Version, installed_sw/iTunes

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/11/14

Vulnerability Publication Date: 2008/07/28

Reference Information

CVE: CVE-2008-3434

BID: 50672

OSVDB: 48328

CWE: 94