iTunes < 9.0.1 Remote Code Execution

medium Nessus Network Monitor Plugin ID 5182

Synopsis

The remote host is vulnerable to a remote code execution attack.

Description

According to its banner, the version of iTunes installed on the remote host is older than 9.0.1. Such versions are potentially affected by a remote buffer overflow when opening specially crafted '.pls' files. An attacker could exploit this flaw to execute arbitrary code on the remote host subject to the privileges of the user running the application.

Solution

Upgrade to iTunes 9.0.1 or later.

See Also

http://lists.apple.com/archives/security-announce/2009/sep/msg00006.html

http://www.securityfocus.com/advisories/17952

http://support.apple.com/kb/HT3884

Plugin Details

Severity: Medium

ID: 5182

Family: Web Clients

Published: 9/23/2009

Updated: 3/6/2019

Nessus ID: 41059, 41060, 41061

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apple:itunes

Patch Publication Date: 9/22/2009

Vulnerability Publication Date: 9/22/2009

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-2817

BID: 36478