English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Apple iTunes Multiple Vulnerabilities


Secunia ID

SA49489

CVE-ID

CVE-2012-0672, CVE-2012-0677

Release Date

12 Jun 2012

Last Change

10 Jul 2012

Criticality

Highly Critical

Solution Status

Vendor Patch

Software

Apple iTunes 10.x

Where

From remote

Impact
System access

This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

Description

Multiple vulnerabilities have been reported in Apple iTunes, which can be exploited by malicious people to compromise a user's system.

1) A boundary error when parsing paths in M3U playlists with no preceding paths or extra information directives can be exploited to cause a heap-based buffer overflow via a specially crafted M3U file containing an overly long path.

2) The application bundles a vulnerable version of WebKit.

For more information see vulnerability #3 in:
SA48454

NOTE: This vulnerability does not affect the application on OS X Lion systems.

3) Boundary errors when parsing titles in M3U playlists can be exploited to cause a heap-based and a stack-based buffer overflow via a specially crafted M3U file containing an overly long title in the extra information directive.

4) A boundary error when parsing paths in M3U playlists can be exploited to cause a heap-based buffer overflow via a specially crafted M3U file containing an overly long path.

5) A boundary error when parsing paths in PLS playlists can be exploited to cause a heap-based buffer overflow via a specially crafted PLS file containing an overly long "File" value.

6) Boundary errors when parsing titles in PLS playlists can be exploited to cause a heap-based and a stack-based buffer overflow via a specially crafted PLS file containing an overly long "Title" value.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.

Solution

Update to version 10.6.3.
http://support.apple.com/kb/DL1426

Reported by

1) Gjoko Krstic, Zero Science Lab.
2) The vendor credits Adam Barth and Abhishek Arya, Google Chrome Security Team
3) Silent fix spotted by Rh0.
4-6) Silent fixes spotted by Secunia Research.

Original Advisory

Apple (APPLE-SA-2012-06-11-1):
http://support.apple.com/kb/HT5318

Gjoko Krstic:
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5093.php

Rh0:
http://dev.metasploit.com/redmine/projects/framework/repository/revisions/e805675c1f94a15c94a278409ca6ca957ec75dc4/entry/modules/exploits/windows/misc/itunes_extm3u_bof.rb