Languages

Archived - About the security content of iTunes 10.5

This document describes the security content of iTunes 10.5.

This article has been archived and is no longer updated by Apple.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see Apple Security Updates.

iTunes 10.5

  • CoreFoundation

    Available for: Windows 7, Vista, XP SP2 or later.

    Impact: A man-in-the-middle attack may lead to an unexpected application termination or arbitrary code execution.

    Description: A memory corruption issue existed in the handling of string tokenization. This issue does not affect OS X Lion systems. For Mac OS X v10.6 systems, this issue is addressed in Security Update 2011-006.

    CVE-ID

    CVE-2011-0259 : Apple.

  • ColorSync

    Available for: Windows 7, Vista, XP SP2 or later.

    Impact: Viewing a maliciously crafted image with an embedded ColorSync profile may lead to an unexpected application termination or arbitrary code execution.

    Description: An integer overflow existed in the handling of images with an embedded ColorSync profile, which may lead to a heap buffer overflow. Opening a maliciously crafted image with an embedded ColorSync profile may lead to an unexpected application termination or arbitrary code execution. This issue does not affect OS X Lion systems.

    CVE-ID

    CVE-2011-0200 : binaryproof working with TippingPoint's Zero Day Initiative.

  • CoreAudio

    Available for: Windows 7, Vista, XP SP2 or later.

    Impact: Playing maliciously crafted audio content may lead to an unexpected application termination or arbitrary code execution.

    Description: A buffer overflow existed in the handling of audio stream encoded with the advanced audio code. This issue does not affect OS X Lion systems.

    CVE-ID

    CVE-2011-3252 : Luigi Auriemma working with TippingPoint's Zero Day Initiative.

  • CoreMedia

    Available for: Windows 7, Vista, XP SP2 or later.

    Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution.

    Description: A buffer overflow existed in the handling of H.264 encoded movie files. For OS X Lion systems, this issue is addressed in OS X Lion v10.7.2. For Mac OS X v10.6 systems, this issue is addressed in Security Update 2011-006.

    CVE-ID

    CVE-2011-3219 : Damian Put working with TippingPoint's Zero Day Initiative.

  • ImageIO

    Available for: Windows 7, Vista, XP SP2 or later.

    Impact: Viewing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution.

    Description: A heap buffer overflow existed in ImageIO's handling of TIFF images. This issue does not affect OS X Lion systems. For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.8.

    CVE-ID

    CVE-2011-0204 : Dominic Chell of NGS Secure.

  • ImageIO

    Available for: Windows 7, Vista, XP SP2 or later.

    Impact: Viewing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution.

    Description: A reentrancy issue existed in ImageIO's handling of TIFF images. This issue does not affect Mac OS X systems.

    CVE-ID

    CVE-2011-0215 : Juan Pablo Lopez Yacubian working with iDefense VCP.

  • WebKit

    Available for: Windows 7, Vista, XP SP2 or later

    Impact: A man-in-the-middle attack while browsing the iTunes Store via iTunes may lead to an unexpected application termination or arbitrary code execution.

    Description: Multiple memory corruption issues existed in WebKit.

    CVE-ID

    CVE-2010-1823 : David Weston of Microsoft and Microsoft Vulnerability Research (MSVR), wushi of team509, and Yong Li of Research In Motion Ltd.

    CVE-2011-0164 : Apple.

    CVE-2011-0218 : SkyLined of Google Chrome Security Team.

    CVE-2011-0221 : Abhishek Arya (Inferno) of Google Chrome Security Team.

    CVE-2011-0222 : Nikita Tarakanov and Alex Bazhanyuk of the CISS Research Team, and Abhishek Arya (Inferno) of Google Chrome Security Team.

    CVE-2011-0223 : Jose A. Vazquez of spa-s3c.blogspot.com working with iDefense VCP.

    CVE-2011-0225 : Abhishek Arya (Inferno) of Google Chrome Security Team.

    CVE-2011-0232 : J23 working with TippingPoint's Zero Day Initiative.

    CVE-2011-0233 : wushi of team509 working with TippingPoint's Zero Day Initiative.

    CVE-2011-0234 : Rob King working with TippingPoint's Zero Day Initiative, wushi of team509 working with TippingPoint's Zero Day Initiative, wushi of team509 working with iDefense VCP.

    CVE-2011-0235 : Abhishek Arya (Inferno) of Google Chrome Security Team.

    CVE-2011-0237 : wushi of team509 working with iDefense VCP.

    CVE-2011-0238 : Adam Barth of Google Chrome Security Team.

    CVE-2011-0240 : wushi of team509 working with iDefense VCP.

    CVE-2011-0253 : Richard Keen.

    CVE-2011-0254 : An anonymous researcher working with TippingPoint's Zero Day Initiative.

    CVE-2011-0255 : An anonymous researcher working with TippingPoint's Zero Day Initiative.

    CVE-2011-0981 : Rik Cabanier of Adobe Systems, Inc.

    CVE-2011-0983 : Martin Barbella.

    CVE-2011-1109 : Sergey Glazunov.

    CVE-2011-1114 : Martin Barbella.

    CVE-2011-1115 : Martin Barbella.

    CVE-2011-1117 : wushi of team509.

    CVE-2011-1121 : miaubiz.

    CVE-2011-1188 : Martin Barbella.

    CVE-2011-1203 : Sergey Glazunov.

    CVE-2011-1204 : Sergey Glazunov.

    CVE-2011-1288 : Andreas Kling of Nokia.

    CVE-2011-1293 : Sergey Glazunov.

    CVE-2011-1296 : Sergey Glazunov.

    CVE-2011-1440 : Jose A. Vazquez of spa-s3c.blogspot.com.

    CVE-2011-1449 : Marek Majkowski.

    CVE-2011-1451 : Sergey Glazunov.

    CVE-2011-1453 : wushi of team509 working with TippingPoint's Zero Day Initiative.

    CVE-2011-1457 : John Knottenbelt of Google.

    CVE-2011-1462 : wushi of team509.

    CVE-2011-1797 : wushi of team509.

    CVE-2011-2338 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer.

    CVE-2011-2339 : Cris Neckar of the Google Chrome Security Team.

    CVE-2011-2341 : Apple.

    CVE-2011-2351 : miaubiz.

    CVE-2011-2352 : Apple.

    CVE-2011-2354 : Apple.

    CVE-2011-2356 : Adam Barth and Abhishek Arya of Google Chrome Security Team using AddressSanitizer.

    CVE-2011-2359 : miaubiz.

    CVE-2011-2788 : Mikolaj Malecki of Samsung.

    CVE-2011-2790 : miaubiz.

    CVE-2011-2792 : miaubiz.

    CVE-2011-2797 : miaubiz.

    CVE-2011-2799 : miaubiz.

    CVE-2011-2809 : Abhishek Arya (Inferno) of Google Chrome Security Team.

    CVE-2011-2811 : Apple.

    CVE-2011-2813 : Cris Neckar of Google Chrome Security Team using AddressSanitizer.

    CVE-2011-2814 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer.

    CVE-2011-2815 : SkyLined of Google Chrome Security Team.

    CVE-2011-2816 : Apple.

    CVE-2011-2817 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer.

    CVE-2011-2818 : Martin Barbella.

    CVE-2011-2820 : Raman Tenneti and Philip Rogers of Google.

    CVE-2011-2823 : SkyLined of Google Chrome Security Team.

    CVE-2011-2827 : miaubiz.

    CVE-2011-2831 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer.

    CVE-2011-3232 : Aki Helin of OUSPG.

    CVE-2011-3233 : Sadrul Habib Chowdhury of the Chromium development community, Cris Neckar and Abhishek Arya (Inferno) of Google Chrome Security Team.

    CVE-2011-3234 : miaubiz.

    CVE-2011-3235 : Dimitri Glazkov, Kent Tamura, Dominic Cooney of the Chromium development community, and Abhishek Arya (Inferno) of Google Chrome Security Team.

    CVE-2011-3236 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer.

    CVE-2011-3237 : Dimitri Glazkov, Kent Tamura, Dominic Cooney of the Chromium development community, and Abhishek Arya (Inferno) of Google Chrome Security Team.

    CVE-2011-3238 : Martin Barbella.

    CVE-2011-3239 : Slawomir Blazek.

    CVE-2011-3241 : Apple.

    CVE-2011-3244 : vkouchna.

  • WebKit

    Available for: Windows 7, Vista, XP SP2 or later.

    Impact: A man-in-the-middle attack may lead to arbitrary code execution.

    Description: A configuration issue existed in WebKit's use of libxslt. A man-in-the-middle attack while browsing the iTunes Store via iTunes may lead to arbitrary files being created with the privileges of the user, which may lead to arbitrary code execution. This issue is addressed through improved libxslt security settings.

    CVE-ID

    CVE-2011-1774 : Nicolas Gregoire of Agarri.

Important: Mention of third-party websites and products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the selection, performance or use of information or products found at third-party websites. Apple provides this only as a convenience to our users. Apple has not tested the information found on these sites and makes no representations regarding its accuracy or reliability. There are risks inherent in the use of any information or products found on the Internet, and Apple assumes no responsibility in this regard. Please understand that a third-party site is independent from Apple and that Apple has no control over the content on that website. Please contact the vendor for additional information.
Last Modified: Apr 7, 2014
Helpful?
Yes
No
  • Last Modified: Apr 7, 2014
  • Article: HT4981
  • Views:

    10488
  • Rating:
    • 100.0

    (1 Responses)

Additional Product Support Information

Start a Discussion
in Apple Support Communities
See all questions on this article See all questions I have asked