iTunes < 10.5.1 Update Authenticity Verification Weakness

High Nessus Network Monitor Plugin ID 6098

Synopsis

The remote host contains an application that is vulnerable to multiple attack vectors.

Description

The remote host has iTunes installed, a popular media player for Windows and Mac OS.

Versions of iTunes earlier than 10.5.1 use an unsecured HTTP connection when checking for or retrieving software updates, which could allow a man-in-the-middle attacker to provide a Trojan horse update that appears to originate from Apple.

Solution

Upgrade to iTunes 10.5.1 or later.

See Also

http://archives.neohapsis.com/archives/bugtraq/2008-07/0250.html

https://support.apple.com/kb/HT5030

http://lists.apple.com/archives/security-announce/2011/nov/msg00003.html

Plugin Details

Severity: High

ID: 6098

File Name: 6098.prm

Family: Web Clients

Published: 2011/11/18

Modified: 2016/01/19

Dependencies: 1735, 8314

Nessus ID: 56871, 56872, 56873

Risk Information

Risk Factor: High

CVSSv2

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 8.1

Temporal Score: 7.5

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apple:itunes

Patch Publication Date: 2011/11/14

Vulnerability Publication Date: 2008/07/28

Reference Information

CVE: CVE-2008-3434

BID: 50672

OSVDB: 48328