exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 46339

Secunia Security Advisory 46339
Posted Oct 12, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has reported multiple vulnerabilities in Apple iTunes, which can be exploited by malicious people to disclose sensitive information, manipulate certain data, conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, and compromise a user's system.

tags | advisory, spoof, vulnerability, xss
systems | apple
SHA-256 | 57358351a538cfbbce8838640f67e4d9acb6caafd4afcd29d3c40c8a4f33b2e8

Secunia Security Advisory 46339

Change Mirror Download
----------------------------------------------------------------------

Ovum says ad hoc tools are out-dated. The best practice approach?
Fast vulnerability intelligence, threat handling, and setup in one tool.

Read the new report on the Secunia VIM:
http://secunia.com/products/corporate/vim/ovum_2011_request/

----------------------------------------------------------------------

TITLE:
Apple iTunes Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA46339

VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/46339/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=46339

RELEASE DATE:
2011-10-13

DISCUSS ADVISORY:
http://secunia.com/advisories/46339/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)

http://secunia.com/advisories/46339/

ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=46339

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION:
Apple has reported multiple vulnerabilities in Apple iTunes, which
can be exploited by malicious people to disclose sensitive
information, manipulate certain data, conduct cross-site scripting
and spoofing attacks, bypass certain security restrictions, and
compromise a user's system.

Multiple vulnerabilities exist within the WebKit and ColorSync
components.

For more information:
SA44375 (#8)
SA45097 (#2)
SA45325
SA45498
SA45698 (#2)
SA46049 (#11)
SA46171 (#6)

1) An error in the CoreFoundation component when handling string
tokenization can be exploited to corrupt memory via a MitM
(Man-in-the-Middle) attack.

2) An error in the CoreAudio component when handling Advanced Audio
Coding (AAC) streams can be exploited to cause a buffer overflow.

NOTE: Vulnerabilities #1 and #2 do not affect the application on OS X
Lion systems.

3) An error in the CoreMedia component when handling H.264 encoded
movie files can be exploited to cause a buffer overflow.

4) Some errors in the WebKit component when using the
AddressSanitizer can be exploited to corrupt memory.

5) Multiple unspecified errors in the WebKit component can be
exploited to corrupt memory.

Successful exploitation of vulnerabilities #1 through #5 may allow
execution of arbitrary code.

SOLUTION:
Update to version 10.5.

Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/

PROVIDED AND/OR DISCOVERED BY:
1) Reported by the vendor.

The vendor also credits:
2) Luigi Auriemma via ZDI.
3) Damian Put via ZDI.
4) Cris Neckar, Adam Barth, and Abhishek Arya (Inferno), Google
Chrome Security Team.

The vendor provides a bundled list of credits for vulnerabilities in
#5:
* Cris Neckar, Google Chrome Security Team
* Abhishek Arya (Inferno), Google Chrome Security Team
* SkyLined, Google Chrome Security Team
* Raman Tenneti and Philip Rogers, Google
* Sadrul Habib Chowdhury, Chromium development community
* Cris Neckar and Abhishek Arya (Inferno), Google Chrome Security
Team
* Dimitri Glazkov, Kent Tamura, Dominic Cooney, Chromium development
community
* Martin Barbella
* Slawomir Blazek
* vkouchna

ORIGINAL ADVISORY:
http://support.apple.com/kb/HT4981

OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/

DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/

EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close