Apple iTunes < 11.2 Multiple Vulnerabilities (credentialed check)

Medium Nessus Plugin ID 74040


The remote host contains an application that is affected by multiple vulnerabilities.


The version of Apple iTunes installed on the remote host is prior to version 11.2. It is, therefore, affected by multiple vulnerabilities :

- A flaw exists in the CFNetwork HTTPProtocol due to a failure to properly ensure that a Set-Cookie HTTP header is complete before interpreting the header's value. A man-in-the-middle attacker can exploit this to bypass security settings by closing the connection before the security settings are sent, resulting in the disclosure of sensitive information. (CVE-2014-1296)

- A memory corruption issue exists due to improper validation of user-supplied input when handling MP4 files. An attacker can exploit this, by convincing a user to open a specially crafted MP4 file, to corrupt memory, resulting in the execution of arbitrary code.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


Upgrade to Apple iTunes 11.2 or later.

See Also

Plugin Details

Severity: Medium

ID: 74040

File Name: itunes_11_2.nasl

Version: 1.8

Type: local

Agent: windows

Family: Windows

Published: 2014/05/16

Updated: 2019/11/26

Dependencies: 25996

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2014-1296

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apple:itunes

Required KB Items: SMB/iTunes/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/05/15

Vulnerability Publication Date: 2014/04/22

Reference Information

CVE: CVE-2014-1296, CVE-2014-8842

BID: 67024

APPLE-SA: APPLE-SA-2014-04-22-2