This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple iTunes. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of the iPodManager COM control. The issue results from the lack of proper restriction of access to the control. An attacker can leverage this vulnerability to escalate privileges and execute code under the context of SYSTEM.