SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   Apple iTunes Vendors:   Apple
Apple iTunes Buffer Overflow in Processing 'itpc:' URLs Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1024220
SecurityTracker URL:  http://securitytracker.com/id/1024220
CVE Reference:   CVE-2010-1777   (Links to External Site)
Date:  Jul 20 2010
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 9.2.1
Description:   A vulnerability was reported in iTunes. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted 'itpc:' URL that, when loaded by the target user, will trigger a buffer overflow and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Clint Ruoho of Laconic Security reported this vulnerability.

Impact:   A remote user can create a URL that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fix (9.2.1), available at:

http://www.apple.com/itunes/download/

For Mac OS X:
The download file is named: "iTunes9.2.1.dmg"
Its SHA-1 digest is: 96b8d985867f7bdeb440db81303d151d5b94d1d0

For Windows XP / Vista / Windows 7:
The download file is named: "iTunesSetup.exe"
Its SHA-1 digest is: 0cf297f0fea951f7eab22d1bd5c34699e5cf756b

For 64-bit Windows XP / Vista / Windows 7:
The download file is named: "iTunes64Setup.exe"
Its SHA-1 digest is: 183f3ce3a543bd3ecba99e4a22a443a6c37f4729

The vendor's advisory is available at:

http://support.apple.com/kb/HT4263

Vendor URL:  support.apple.com/kb/HT4263 (Links to External Site)
Cause:   Boundary error
Underlying OS:  UNIX (macOS/OS X), Windows (7), Windows (Vista), Windows (XP)

Message History:   None.


 Source Message Contents

Subject:  APPLE-SA-2010-07-19-1 iTunes 9.2.1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2010-07-19-1 iTunes 9.2.1

iTunes 9.2.1 is now available and addresses the following:

iTunes
CVE-ID:  CVE-2010-1777
Available for:  Windows 7, Vista, XP SP2 or later
Impact:  Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description:  A buffer overflow exists in the handling of "itpc:"
URLs. Accessing a maliciously crafted "itpc:" URL may lead to an
unexpected application termination or arbitrary code execution. This
issue is addressed through improved bounds checking. Credit to Clint
Ruoho of Laconic Security for reporting this issue.


iTunes 9.2.1 may be obtained from:
http://www.apple.com/itunes/download/

For Mac OS X:
The download file is named: "iTunes9.2.1.dmg"
Its SHA-1 digest is: 96b8d985867f7bdeb440db81303d151d5b94d1d0

For Windows XP / Vista / Windows 7:
The download file is named: "iTunesSetup.exe"
Its SHA-1 digest is: 0cf297f0fea951f7eab22d1bd5c34699e5cf756b

For 64-bit Windows XP / Vista / Windows 7:
The download file is named: "iTunes64Setup.exe"
Its SHA-1 digest is: 183f3ce3a543bd3ecba99e4a22a443a6c37f4729

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (Darwin)

iQEcBAEBAgAGBQJMRHXbAAoJEGnF2JsdZQeeA6YIAKQTknq0QjJC7ZDRssS944PW
JfplX37pNs5pD/55dcfm8rPbpUhhiSjaifTAhTu+cIK6QysKpe/Ish305kV2sufU
Hwu3q3R7mKuHyjkMG4ELrBdvKPCYmURUb70OyLlu8mRCNNbpybgKeyDbr6OHqal9
7z/he+FuRDQ8VWu33dGQzmgg3iVmjtJQ+uqEH+rq2XAOgQEnWfRZkgKoIV1u9KAp
O97yTgM05mg57pf6wpQwdNrEoGbMf+C1vt9KFSdnhmQvtcN1UwglUFJpNgJWjL4/
Nmt46GonF88J+rlFr3s2GzZtwyQZSMQBYNxA39I4PZT9myk4QIUiwaCiP8tV/g4=
=+tik
-----END PGP SIGNATURE-----
 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@lists.apple.com)
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC