Apple iTunes < 10.5.1 Update Authenticity Verification Weakness (uncredentialed check)

Medium Nessus Plugin ID 56873

Synopsis

The remote host contains an application that is susceptible to a man-in-the-middle attack.

Description

The version of Apple iTunes on the remote host is prior to version 10.5.1. It is, therefore, affected by a man-in-the-middle vulnerability due to using unsecured HTTP connections when checking for or retrieving software updates. A remote attacker can exploit this to execute arbitrary code by means of a trojan horse update that appears to originate from Apple.

Solution

Upgrade to Apple iTunes 10.5.1 or later.

See Also

http://seclists.org/bugtraq/2008/Jul/249

http://support.apple.com/kb/HT5030

http://lists.apple.com/archives/security-announce/2011/Nov/msg00003.html

Plugin Details

Severity: Medium

ID: 56873

File Name: itunes_10_5_1_banner.nasl

Version: $Revision: 1.13 $

Type: remote

Published: 2011/11/18

Modified: 2016/10/27

Dependencies: 20217

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apple:itunes

Required KB Items: iTunes/sharing

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/11/14

Vulnerability Publication Date: 2008/07/28

Reference Information

CVE: CVE-2008-3434

BID: 50672

CWE: 94