Apple iTunes < 8.2 itms: URI Handling Overflow (uncredentialed check)

high Nessus Plugin ID 38986

Synopsis

The remote host contains an application that is affected by a buffer overflow vulnerability.

Description

The version of Apple iTunes on the remote host is prior to version 8.2. It is, therefore, affected by a stack-based buffer overflow that can be triggered when parsing 'itms:' URLs. By convincing a user to click on a specially crafted link, a remote attacker can cause a denial of service or execute arbitrary code with the user's level of privileges.

Solution

Upgrade to Apple iTunes 8.2 or later.

See Also

http://support.apple.com/kb/HT3592

http://lists.apple.com/archives/security-announce/2009/Jun/msg00001.html

Plugin Details

Severity: High

ID: 38986

File Name: itunes_8_2_banner.nasl

Version: 1.20

Type: remote

Published: 6/2/2009

Updated: 7/13/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:apple:itunes

Required KB Items: iTunes/sharing

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/1/2009

Vulnerability Publication Date: 6/1/2009

Exploitable With

Core Impact

Metasploit (Apple OS X iTunes 8.1.1 ITMS Overflow)

Reference Information

CVE: CVE-2009-0950

BID: 35157

CWE: 119