Multiple vulnerabilities in Apple iTunes

Published: 2017-12-14 11:39:48 | Updated: 2017-12-18 14:07:24
Severity High
Patch available YES
Number of vulnerabilities 6
CVSSv2 6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5 (AV:N/AC:L/Au:S/C:C/I:N/A:N/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
CVSSv3 8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
5.5 [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE ID CVE-2017-13856
CVE-2017-13864
CVE-2017-13866
CVE-2017-13870
CVE-2017-7156
CVE-2017-7157
CWE ID CWE-119
CWE-200
Exploitation vector Network
Public exploit Not available
Vulnerable software iTunes
Vulnerable software versions iTunes 12.7.1
iTunes 12.7
iTunes 12.6
iTunes 12.5.5
Vendor URL Apple Inc.
Advisory type Public

Security Advisory

1) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted web content, trigger memory corruption in the WebKit component and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 12.7.2.

External links

https://support.apple.com/en-us/HT208326

2) Information disclosure

Description

The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information on the target system.

The weakness exists due to a privacy issue in the use of client certificates. A remote attacker can obtain credentials and track the user's actions.

Remediation

Update to version 12.7.2.

External links

https://support.apple.com/en-us/HT208326

3) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted web content, trigger memory corruption in the WebKit component and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 12.7.2.

External links

https://support.apple.com/en-us/HT208326

4) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted web content, trigger memory corruption in the WebKit component and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 12.7.2.

External links

https://support.apple.com/en-us/HT208326

5) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted web content, trigger memory corruption in the WebKit component and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 12.7.2.

External links

https://support.apple.com/en-us/HT208326

6) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted web content, trigger memory corruption in the WebKit component and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 12.7.2.

External links

https://support.apple.com/en-us/HT208326

Back to List