Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Highly critical

Apple iTunes Multiple Vulnerabilities

-

Description


Multiple vulnerabilities have been reported in Apple iTunes, which can be exploited by malicious people to conduct spoofing attacks and compromise a user's system.

1) The application does not properly validate SSL server certificates, which can be exploited to e.g. conduct Man-in-the-Middle (MitM) attacks.

2) An integer overflow error within the "string.replace()" method can be exploited to cause a heap-based buffer overflow.

3) Some vulnerabilities are caused due to a bundled vulnerable version of WebKit.

For more information:
SA49724
SA50105
SA51157
SA52002
SA52320
SA52534
SA52658

4) An array indexing error when handling JSArray objects can be exploited to access out-of-bounds memory by manipulating the JSArray object using a custom sort comparison function.

5) A boundary error within the "string.concat()" method can be exploited to cause a heap-based buffer overflow.

Successful exploitation of the vulnerabilities #2, #4, and #5 may allow execution of arbitrary code.

The vulnerabilities are reported in versions prior to 11.0.3.


Solution:
Update to version 11.0.3.

Further details available to Secunia VIM customers

Provided and/or discovered by:
1) The vendor credits Christopher, ThinkSECURE Pte Ltd and Christopher Hickstein, University of Minnesota.
2, 5) pa_kt via ZDI
4) Vitaliy Toropov via ZDI

The vendor also credits:
Jay Civelli, the Chromium development community
Inferno and Martin Barbella, Google Chrome Security Team
Fermin J. Serna, the Google Security Team
David German, Google
Sergey Glazunov
miaubiz
Ryan Humenick

Original Advisory:
APPLE-SA-2013-05-16-1:
http://support.apple.com/kb/HT5766

ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-13-107/
http://www.zerodayinitiative.com/advisories/ZDI-13-108/
http://www.zerodayinitiative.com/advisories/ZDI-13-109/

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Apple iTunes Multiple Vulnerabilities

No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability