Searching
..

Click anywhere to stop

KLA11455
Multiple vulnerabilities in Apple iTunes

Обновлено: 22/01/2024
Дата обнаружения
25/03/2019
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Apple iTunes. Malicious users can exploit these vulnerabilities to execute arbitrary code, perform cross-site scripting attack, obtain sensitive information, bypass security restrictions and gain privileges.

Below is a complete list of vulnerabilities:

  1. A type confusion vulnerability in WebKit can be exploited remotely to execute arbitrary code;
  2. Multiple memory corruption vulnerabilities can be exploited remotely to execute arbitrary code;
  3. Multiple logic vulnerabilities in WebKit can be exploited remotely to perform cross-site scripting attack;
  4. A validation vulnerability in WebKit can be exploited remotely to obtain sensitive information;
  5. A memory corruption vulnerability can be exploited loccaly to bypass security restrictions;
  6. A buffer overflow vulnerability in CoreCrypto can be exploited locally to elevate privileges;
  7. A cross-origin vulnerability in WebKit can be exploited locally to obtain sensitive information;
Эксплуатация

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Пораженные продукты

Apple iTunes earlier than 12.9.4

Решение

Update to the latest version
Download iTunes

Первичный источник обнаружения
HT209604
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

SB 
[?]

PE 
[?]

XSS/CSS 
[?]
Связанные продукты
Apple iTunes
CVE-IDS
CVE-2019-72859.3Critical
CVE-2019-62019.3Critical
CVE-2019-85069.3Critical
CVE-2019-85189.3Critical
CVE-2019-85636.8High
CVE-2019-85449.3Critical
CVE-2019-85514.3Warning
CVE-2019-85359.3Critical
CVE-2019-85239.3Critical
CVE-2019-85596.8High
CVE-2019-85586.8High
CVE-2019-85039.3Critical
CVE-2019-85566.8High
CVE-2019-72924.3Warning
CVE-2019-85626.8High
CVE-2019-85246.8High
CVE-2019-85369.3Critical
CVE-2019-85426.8High
CVE-2019-85154.3Warning
CVE-2019-86396.8High
CVE-2019-86386.8High
Узнай статистику распространения уязвимостей в твоем регионе