Apple iTunes < 11.2 Multiple Vulnerabilities (uncredentialed check)

medium Nessus Plugin ID 74041


The remote host contains an application that is affected by multiple vulnerabilities.


The version of Apple iTunes running on the remote host is prior to version 11.2. It is, therefore, affected by multiple vulnerabilities :

- A flaw exists in the CFNetwork HTTPProtocol due to a failure to properly ensure that a Set-Cookie HTTP header is complete before interpreting the header's value. A man-in-the-middle attacker can exploit this to bypass security settings by closing the connection before the security settings are sent, resulting in the disclosure of sensitive information. (CVE-2014-1296)

- A memory corruption issue exists due to improper validation of user-supplied input when handling MP4 files. An attacker can exploit this, by convincing a user to open a specially crafted MP4 file, to corrupt memory, resulting in the execution of arbitrary code.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


Upgrade to Apple iTunes 11.2 or later.

See Also

Plugin Details

Severity: Medium

ID: 74041

File Name: itunes_11_2_banner.nasl

Version: 1.8

Type: remote

Published: 5/16/2014

Updated: 11/26/2019

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 2.7


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2014-1296

Vulnerability Information

CPE: cpe:/a:apple:itunes

Required KB Items: iTunes/sharing

Exploit Ease: No known exploits are available

Patch Publication Date: 5/15/2014

Vulnerability Publication Date: 4/22/2014

Reference Information

CVE: CVE-2014-1296, CVE-2014-8842

BID: 67024

APPLE-SA: APPLE-SA-2014-04-22-2