Apple iTunes < 12.5.5 Multiple Vulnerabilities (uncredentialed check) with memory corruption and arbitrary code executio
Reporter | Title | Published | Views | Family All 73 |
---|---|---|---|---|
Tenable Nessus | Apple iTunes < 12.5.5 Multiple Vulnerabilities (credentialed check) | 27 Jan 201700:00 | – | nessus |
Tenable Nessus | macOS : Apple Safari < 10.0.3 Multiple Vulnerabilities | 26 Jan 201700:00 | – | nessus |
Tenable Nessus | Fedora 24 : webkitgtk4 (2017-b1abcbe695) | 28 Feb 201700:00 | – | nessus |
Tenable Nessus | Safari < 10.0.3 Multiple Vulnerabilities | 1 Feb 201700:00 | – | nessus |
Tenable Nessus | Ubuntu 16.04 LTS : WebKitGTK+ vulnerabilities (USN-3200-1) | 17 Feb 201700:00 | – | nessus |
Tenable Nessus | Fedora 25 : webkitgtk4 (2017-0beb752b6e) | 1 Mar 201700:00 | – | nessus |
Tenable Nessus | Apple iOS < 10.2.1 Multiple Vulnerabilities | 30 Jan 201700:00 | – | nessus |
Tenable Nessus | Apple TV < 10.1.1 Multiple Vulnerabilities | 30 Jan 201700:00 | – | nessus |
Tenable Nessus | SUSE SLED12 / SLES12 Security Update : webkit2gtk3 (SUSE-SU-2017:2933-1) | 7 Nov 201700:00 | – | nessus |
Tenable Nessus | openSUSE Security Update : webkit2gtk3 (openSUSE-2017-1268) | 13 Nov 201700:00 | – | nessus |
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(96831);
script_version("1.5");
script_cvs_date("Date: 2019/11/13");
script_cve_id(
"CVE-2017-2354",
"CVE-2017-2355",
"CVE-2017-2356",
"CVE-2017-2366"
);
script_bugtraq_id(95733, 95736);
script_xref(name:"APPLE-SA", value:"APPLE-SA-2017-01-23-7");
script_name(english:"Apple iTunes < 12.5.5 Multiple Vulnerabilities (uncredentialed check)");
script_summary(english:"Checks the version of iTunes.");
script_set_attribute(attribute:"synopsis", value:
"An application running on the remote host is affected by multiple
vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of Apple iTunes running on the remote host is prior to
12.5.5 It is, therefore, affected by multiple vulnerabilities :
- Multiple memory corruption issues exist in WebKit due to
improper validation of certain unspecified input. An
unauthenticated, remote attacker can exploit these, via
specially crafted web content, to corrupt memory,
resulting in the execution of arbitrary code.
(CVE-2017-2354, CVE-2017-2356, CVE-2017-2366)
- An unspecified memory initialization flaw exists in
WebKit that allows an unauthenticated, remote attacker
to execute arbitrary code. (CVE-2017-2355)
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.");
script_set_attribute(attribute:"see_also", value:"https://support.apple.com/en-us/HT207486");
# https://lists.apple.com/archives/security-announce/2017/Jan/msg00008.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4f2d8756");
script_set_attribute(attribute:"solution", value:
"Upgrade to Apple iTunes version 12.5.5 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-2366");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/01/23");
script_set_attribute(attribute:"patch_publication_date", value:"2017/01/23");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/01/27");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:itunes");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Peer-To-Peer File Sharing");
script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("itunes_sharing.nasl");
script_require_keys("iTunes/sharing");
script_require_ports("Services/www", 3689);
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:3689, embedded:TRUE, ignore_broken:TRUE);
get_kb_item_or_exit("iTunes/" + port + "/enabled");
type = get_kb_item_or_exit("iTunes/" + port + "/type");
source = get_kb_item_or_exit("iTunes/" + port + "/source");
version = get_kb_item_or_exit("iTunes/" + port + "/version");
if (type != 'Windows') audit(AUDIT_OS_NOT, "Windows");
fixed_version = "12.5.5";
if (ver_compare(ver:version, fix:fixed_version, strict:FALSE) < 0)
{
report = '\n Version source : ' + source +
'\n Installed version : ' + version +
'\n Fixed version : ' + fixed_version +
'\n';
security_report_v4(port:port, extra:report, severity:SECURITY_WARNING);
}
else audit(AUDIT_LISTEN_NOT_VULN, "iTunes", port, version);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo