About the security content of iTunes 10.6.3
This document describes the security content of iTunes 10.6.3.
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see "Apple Security Updates".
iTunes 10.6.3
- iTunes - Available for: Mac OS X v10.5.8 or later, Windows 7, Vista, XP SP2 or later - Impact: Importing a maliciously crafted .m3u playlist may lead to an unexpected application termination or arbitrary code execution - Description: A heap buffer overflow existed in the handling of .m3u playlists. - CVE-ID - CVE-2012-0677 : Gjoko Krstic of Zero Science Lab 
- WebKit - Available for: Windows 7, Vista, XP SP2 or later - Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution - Description: A memory corruption issue existed in WebKit. - CVE-ID - CVE-2012-0672 : Adam Barth and Abhishek Arya of the Google Chrome Security Team 
Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.