Secunia Security Advisory - Apple has reported multiple vulnerabilities in Apple iTunes, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, and compromise a user's system.
57358351a538cfbbce8838640f67e4d9acb6caafd4afcd29d3c40c8a4f33b2e8
----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool.
Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/
----------------------------------------------------------------------
TITLE:
Apple iTunes Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA46339
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46339/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46339
RELEASE DATE:
2011-10-13
DISCUSS ADVISORY:
http://secunia.com/advisories/46339/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/46339/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46339
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Apple has reported multiple vulnerabilities in Apple iTunes, which
can be exploited by malicious people to disclose sensitive
information, manipulate certain data, conduct cross-site scripting
and spoofing attacks, bypass certain security restrictions, and
compromise a user's system.
Multiple vulnerabilities exist within the WebKit and ColorSync
components.
For more information:
SA44375 (#8)
SA45097 (#2)
SA45325
SA45498
SA45698 (#2)
SA46049 (#11)
SA46171 (#6)
1) An error in the CoreFoundation component when handling string
tokenization can be exploited to corrupt memory via a MitM
(Man-in-the-Middle) attack.
2) An error in the CoreAudio component when handling Advanced Audio
Coding (AAC) streams can be exploited to cause a buffer overflow.
NOTE: Vulnerabilities #1 and #2 do not affect the application on OS X
Lion systems.
3) An error in the CoreMedia component when handling H.264 encoded
movie files can be exploited to cause a buffer overflow.
4) Some errors in the WebKit component when using the
AddressSanitizer can be exploited to corrupt memory.
5) Multiple unspecified errors in the WebKit component can be
exploited to corrupt memory.
Successful exploitation of vulnerabilities #1 through #5 may allow
execution of arbitrary code.
SOLUTION:
Update to version 10.5.
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY:
1) Reported by the vendor.
The vendor also credits:
2) Luigi Auriemma via ZDI.
3) Damian Put via ZDI.
4) Cris Neckar, Adam Barth, and Abhishek Arya (Inferno), Google
Chrome Security Team.
The vendor provides a bundled list of credits for vulnerabilities in
#5:
* Cris Neckar, Google Chrome Security Team
* Abhishek Arya (Inferno), Google Chrome Security Team
* SkyLined, Google Chrome Security Team
* Raman Tenneti and Philip Rogers, Google
* Sadrul Habib Chowdhury, Chromium development community
* Cris Neckar and Abhishek Arya (Inferno), Google Chrome Security
Team
* Dimitri Glazkov, Kent Tamura, Dominic Cooney, Chromium development
community
* Martin Barbella
* Slawomir Blazek
* vkouchna
ORIGINAL ADVISORY:
http://support.apple.com/kb/HT4981
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------