SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   Apple iTunes Vendors:   Apple
Apple iTunes for Windows Multiple Flaws Let Remote Users Conduct Cross-Site Scripting Attacks and Execute Arbitrary Code
SecurityTracker Alert ID:  1039428
SecurityTracker URL:  http://securitytracker.com/id/1039428
CVE Reference:   CVE-2017-7081, CVE-2017-7087, CVE-2017-7090, CVE-2017-7091, CVE-2017-7092, CVE-2017-7093, CVE-2017-7094, CVE-2017-7095, CVE-2017-7096, CVE-2017-7098, CVE-2017-7099, CVE-2017-7100, CVE-2017-7102, CVE-2017-7104, CVE-2017-7107, CVE-2017-7109, CVE-2017-7111, CVE-2017-7117, CVE-2017-7120   (Links to External Site)
Date:  Sep 25 2017
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Apple iTunes for Windows. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass same-origin restrictions on the target system. A remote user can conduct cross-site scripting attacks.

A remote user can trigger an input validation flaw in the WebKit component to execute arbitrary code [CVE-2017-7081].

A remote user can trigger a memory corruption error in the WebKit component to execute arbitrary code [CVE-2017-7087, CVE-2017-7091, CVE-2017-7092, CVE-2017-7093, CVE-2017-7094, CVE-2017-7095, CVE-2017-7096, CVE-2017-7098, CVE-2017-7099, CVE-2017-7100, CVE-2017-7102, CVE-2017-7104, CVE-2017-7107, CVE-2017-7111, CVE-2017-7117, CVE-2017-7120].

A remote user can trigger a cross-origin permissions error in the WebKit component to obtain cookies for other domains [CVE-2017-7090].

A remote user can trigger an input validation flaw in the WebKit component to conduct cross site scripting attacks [CVE-2017-7109].

Felipe Freitas of Instituto Tecnologico de Aeronautica, Masato Kinugawa and Mario Heiderich of Cure53, Qixun Zhao (@S0rryMybad) of Qihoo 360 Vulcan Team, Samuel Gro and Niklas Baumstark (via Trend Micro's Zero Day Initiative), Tim Michaud (@TimGMichaud) of Leviathan Security Group, Wang Junjie, Wei Lei, and Liu Yang of Nanyang Technological University (via Trend Micro's Zero Day Initiative), Wei Yuan of Baidu Security Lab (via Trend Micro's Zero Day Initiative), avlidienbrunn, chenqin of Ant-financial Light-Year Security Lab, likemeng of Baidu Security Lab (via Trend Micro's Zero Day Initiative), and lokihardt of Google Project Zero reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can bypass same-origin restrictions on the target system.

A remote user can conduct cross-site scripting attacks.

Solution:   The vendor has issued a fix (12.7).

The vendor advisory is available at:

https://support.apple.com/en-us/HT208141

Vendor URL:  support.apple.com/en-us/HT208141 (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC