iTunes < 10.5.1 Update Authenticity Verification Weakness

high Nessus Network Monitor Plugin ID 6098

Synopsis

The remote host contains an application that is vulnerable to multiple attack vectors.

Description

The remote host has iTunes installed, a popular media player for Windows and Mac OS.

Versions of iTunes earlier than 10.5.1 use an unsecured HTTP connection when checking for or retrieving software updates, which could allow a man-in-the-middle attacker to provide a Trojan horse update that appears to originate from Apple.

Solution

Upgrade to iTunes 10.5.1 or later.

See Also

http://archives.neohapsis.com/archives/bugtraq/2008-07/0250.html

https://support.apple.com/kb/HT5030

http://lists.apple.com/archives/security-announce/2011/nov/msg00003.html

Plugin Details

Severity: High

ID: 6098

Family: Web Clients

Published: 11/18/2011

Updated: 3/6/2019

Nessus ID: 56871, 56872, 56873

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apple:itunes

Patch Publication Date: 11/14/2011

Vulnerability Publication Date: 7/28/2008

Reference Information

CVE: CVE-2008-3434

BID: 50672