The version of Apple iTunes running on the remote host is prior to 12.3. It is, therefore, affected by multiple vulnerabilities in the WebKit, CoreText, and ICU components, and in the bundled version of the Microsoft Visual Studio C++ Redistributable Package. An attacker can exploit these vulnerabilities to cause a denial of service, execute arbitrary code, or gain access to encrypted SMB credentials.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(86601);
script_version("1.6");
script_cvs_date("Date: 2019/11/20");
script_cve_id(
"CVE-2010-3190",
"CVE-2014-8146",
"CVE-2015-1152",
"CVE-2015-1153",
"CVE-2015-1157",
"CVE-2015-1205",
"CVE-2015-3686",
"CVE-2015-3687",
"CVE-2015-3688",
"CVE-2015-3730",
"CVE-2015-3731",
"CVE-2015-3733",
"CVE-2015-3734",
"CVE-2015-3735",
"CVE-2015-3736",
"CVE-2015-3737",
"CVE-2015-3738",
"CVE-2015-3739",
"CVE-2015-3740",
"CVE-2015-3741",
"CVE-2015-3742",
"CVE-2015-3743",
"CVE-2015-3744",
"CVE-2015-3745",
"CVE-2015-3746",
"CVE-2015-3747",
"CVE-2015-3748",
"CVE-2015-3749",
"CVE-2015-5755",
"CVE-2015-5761",
"CVE-2015-5789",
"CVE-2015-5790",
"CVE-2015-5791",
"CVE-2015-5792",
"CVE-2015-5793",
"CVE-2015-5794",
"CVE-2015-5795",
"CVE-2015-5796",
"CVE-2015-5797",
"CVE-2015-5798",
"CVE-2015-5799",
"CVE-2015-5800",
"CVE-2015-5801",
"CVE-2015-5802",
"CVE-2015-5803",
"CVE-2015-5804",
"CVE-2015-5805",
"CVE-2015-5806",
"CVE-2015-5807",
"CVE-2015-5808",
"CVE-2015-5809",
"CVE-2015-5810",
"CVE-2015-5811",
"CVE-2015-5812",
"CVE-2015-5813",
"CVE-2015-5814",
"CVE-2015-5815",
"CVE-2015-5816",
"CVE-2015-5817",
"CVE-2015-5818",
"CVE-2015-5819",
"CVE-2015-5821",
"CVE-2015-5822",
"CVE-2015-5823",
"CVE-2015-5874",
"CVE-2015-5920"
);
script_bugtraq_id(
42811,
72288,
74457,
74523,
74525,
75491,
76338,
76343,
76763,
76764,
76765,
76766
);
script_xref(name:"APPLE-SA", value:"APPLE-SA-2015-09-16-3");
script_xref(name:"IAVB", value:"2011-B-0046");
script_name(english:"Apple iTunes < 12.3 Multiple Vulnerabilities (uncredentialed check)");
script_summary(english:"Checks the version of iTunes.");
script_set_attribute(attribute:"synopsis", value:
"The remote host contains an application that is affected by multiple
vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of Apple iTunes running on the remote host is prior to
12.3. It is, therefore, affected by multiple vulnerabilities in the
WebKit, CoreText, and ICU components, and in the bundled version of
the Microsoft Visual Studio C++ Redistributable Package. An attacker
can exploit these vulnerabilities to cause a denial of service,
execute arbitrary code, or gain access to encrypted SMB credentials.
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.");
script_set_attribute(attribute:"see_also", value:"https://support.apple.com/en-us/HT205221");
# https://lists.apple.com/archives/security-announce/2015/Sep/msg00003.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?fb0bd3a7");
script_set_attribute(attribute:"solution", value:
"Upgrade to Apple iTunes version 12.3 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2010-3190");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2010/08/31");
script_set_attribute(attribute:"patch_publication_date", value:"2015/09/16");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/10/26");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:itunes");
script_set_attribute(attribute:"stig_severity", value:"II");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Peer-To-Peer File Sharing");
script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("itunes_sharing.nasl");
script_require_keys("iTunes/sharing");
script_require_ports("Services/www", 3689);
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:3689, embedded:TRUE, ignore_broken:TRUE);
get_kb_item_or_exit("iTunes/" + port + "/enabled");
type = get_kb_item_or_exit("iTunes/" + port + "/type");
source = get_kb_item_or_exit("iTunes/" + port + "/source");
version = get_kb_item_or_exit("iTunes/" + port + "/version");
if (type != 'Windows') audit(AUDIT_OS_NOT, "Windows");
fixed_version = "12.3.0.44";
if (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)
{
if (report_verbosity > 0)
{
report = '\n Version source : ' + source +
'\n Installed version : ' + version +
'\n Fixed version : ' + fixed_version +
'\n';
security_hole(port:port, extra:report);
}
else security_hole(port);
}
else audit(AUDIT_LISTEN_NOT_VULN, "iTunes", port, version);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3190
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8146
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1152
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1153
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1157
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1205
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3686
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3687
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3688
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3730
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3731
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3733
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3734
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3735
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3736
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3737
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3738
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3739
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3740
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3741
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3742
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3743
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3744
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3745
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3746
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3747
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3748
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3749
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5755
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5761
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5790
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5792
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5793
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5794
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5795
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5796
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5797
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5798
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5799
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5800
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5801
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5802
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5803
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5804
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5806
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5807
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5808
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5809
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5810
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5811
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5813
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5814
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5816
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5817
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5818
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5819
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5821
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5822
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5823
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5874
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5920
www.nessus.org/u?fb0bd3a7
support.apple.com/en-us/HT205221