Apple iTunes < 11.2 Multiple Vulnerabilities (uncredentialed check)

High Nessus Plugin ID 74041


The remote host contains an application that is affected by multiple vulnerabilities.


The version of Apple iTunes running on the remote host is prior to version 11.2. It is, therefore, affected by multiple vulnerabilities :

- A flaw exists in the CFNetwork HTTPProtocol due to a failure to properly ensure that a Set-Cookie HTTP header is complete before interpreting the header's value. A man-in-the-middle attacker can exploit this to bypass security settings by closing the connection before the security settings are sent, resulting in the disclosure of sensitive information. (CVE-2014-1296)

- A memory corruption issue exists due to improper validation of user-supplied input when handling MP4 files. An attacker can exploit this, by convincing a user to open a specially crafted MP4 file, to corrupt memory, resulting in the execution of arbitrary code.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


Upgrade to Apple iTunes 11.2 or later.

See Also

Plugin Details

Severity: High

ID: 74041

File Name: itunes_11_2_banner.nasl

Version: 1.7

Type: remote

Published: 2014/05/16

Updated: 2018/11/15

Dependencies: 20217

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apple:itunes

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/05/15

Vulnerability Publication Date: 2014/04/22

Reference Information

CVE: CVE-2014-1296, CVE-2014-8842

BID: 67024

APPLE-SA: APPLE-SA-2014-04-22-2