iTunes < 9.0.1 Remote Code Execution

Medium Nessus Network Monitor Plugin ID 5182

Synopsis

The remote host is vulnerable to a remote code execution attack.

Description

According to its banner, the version of iTunes installed on the remote host is older than 9.0.1. Such versions are potentially affected by a remote buffer overflow when opening specially crafted '.pls' files. An attacker could exploit this flaw to execute arbitrary code on the remote host subject to the privileges of the user running the application.

Solution

Upgrade to iTunes 9.0.1 or later.

See Also

http://lists.apple.com/archives/security-announce/2009/sep/msg00006.html

http://www.securityfocus.com/advisories/17952

http://support.apple.com/kb/HT3884

Plugin Details

Severity: Medium

ID: 5182

Family: Web Clients

Published: 2009/09/23

Modified: 2016/01/19

Dependencies: 1735, 8314

Nessus ID: 41059, 41060, 41061

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apple:itunes

Patch Publication Date: 2009/09/22

Vulnerability Publication Date: 2009/09/22

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-2817

BID: 36478