ID

VAR-200903-0240


CVE

CVE-2009-0016


TITLE

Windows Work on Apple iTunes Denial of service in Japan (DoS) Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2009-001498

DESCRIPTION

Apple iTunes before 8.1 on Windows allows remote attackers to cause a denial of service (infinite loop) via a Digital Audio Access Protocol (DAAP) message with a crafted Content-Length header. Apple iTunes is prone to an information-disclosure vulnerability and a denial-of-service vulnerability. Successfully exploiting these issues may allow an attacker to obtain sensitive information or cause the affected application to crash, denying service to legitimate users. Versions prior to Apple iTunes 8.1 are vulnerable.  Impact: ======= Denial of service.   Risk:  ===== Medium   Affected Software:  ================== Apple iTunes 8 for Windows, other versions may be affected  This issue does not affect Mac OS X systems References:  ===========  FortiGuard Advisory: http://www.fortiguardcenter.com/advisory/FGA-2009-11.html Apple Security Bulletin: http://support.apple.com/kb/HT3487  Apple Security Updates: http://support.apple.com/kb/ht1222  CVE ID: CVE-2009-0016  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0016  Acknowledgments:   ================ Xiaopeng Zhang, Zhenhua Liu, and Junfeng Jia of Fortinet's FortiGuard Global Security Research Team *** This email and any attachments thereto may contain private, confidential, and privileged material for the sole use of the intended recipient. Any review, copying, or distribution of this email (or any attachments thereto) by others is strictly prohibited. If you are not the intended recipient, please contact the sender immediately and permanently delete the original and any copies of this email and any attachments thereto. *** . ---------------------------------------------------------------------- Did you know? Our assessment and impact rating along with detailed information such as exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ---------------------------------------------------------------------- TITLE: Apple iTunes Information Disclosure and Denial of Service SECUNIA ADVISORY ID: SA34254 VERIFY ADVISORY: http://secunia.com/advisories/34254/ DESCRIPTION: A vulnerability and a security issue have been reported in Apple iTunes, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially disclose sensitive information. NOTE: The vulnerability does not affect Mac OS X systems. 2) An error in the implementation of the iTunes podcast feature can be exploited to entice a user into sending iTunes credentials to a podcast server via an authentication dialog presented when subscribing to a malicious podcast. The vulnerability and security issue are reported in version 8. SOLUTION: Update to version 8.1. PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Xiaopeng Zhang, Zhenhua Liu, and Junfeng Jia of Fortinet's FortiGuard Global Security Research Team 2) Simon Bellwood ORIGINAL ADVISORY: http://support.apple.com/kb/HT3487 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2009-0016 // JVNDB: JVNDB-2009-001498 // BID: 34094 // VULHUB: VHN-37462 // PACKETSTORM: 75707 // PACKETSTORM: 75695

AFFECTED PRODUCTS

vendor:applemodel:itunesscope:eqversion:7.0.2

Trust: 1.9

vendor:applemodel:itunesscope:eqversion:6.0.5

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:6.0

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.1.1

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.1.0

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.2.0

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.0.1

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.0.0

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.3.2

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:7.3.1

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:7.4

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:4.9.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:5.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.5

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.7

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.7.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.7.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.1.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:2.0.4

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.2.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:5.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:1.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.8.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.7

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:2.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.5.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:3.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:2.0.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:2.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.6

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.4

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:3.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:2.0.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.6.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.5.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.2.72

Trust: 1.0

vendor:applemodel:itunesscope:lteversion:8.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.4.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.7.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.7.1.30

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.5

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.8

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.3.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:1.1.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.9

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:1.1.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.7.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:5.0.0

Trust: 1.0

vendor:applemodel:itunesscope:ltversion:8.1

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0.2.20

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:itunesscope:neversion:8.1

Trust: 0.3

sources: BID: 34094 // JVNDB: JVNDB-2009-001498 // CNNVD: CNNVD-200903-261 // NVD: CVE-2009-0016

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-0016
value: MEDIUM

Trust: 1.0

NVD: CVE-2009-0016
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200903-261
value: MEDIUM

Trust: 0.6

VULHUB: VHN-37462
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-0016
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-37462
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-37462 // JVNDB: JVNDB-2009-001498 // CNNVD: CNNVD-200903-261 // NVD: CVE-2009-0016

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-37462 // JVNDB: JVNDB-2009-001498 // NVD: CVE-2009-0016

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200903-261

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200903-261

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001498

PATCH

title:APPLE-SA-2009-03-11 iTunes 8.1url:http://lists.apple.com/archives/security-announce//2009/Mar/msg00001.html

Trust: 0.8

title:HT3487url:http://support.apple.com/kb/HT3487

Trust: 0.8

sources: JVNDB: JVNDB-2009-001498

EXTERNAL IDS

db:NVDid:CVE-2009-0016

Trust: 2.9

db:BIDid:34094

Trust: 2.0

db:SECUNIAid:34254

Trust: 1.8

db:OSVDBid:52578

Trust: 1.7

db:VUPENid:ADV-2009-0702

Trust: 1.7

db:SECTRACKid:1021842

Trust: 1.7

db:JVNDBid:JVNDB-2009-001498

Trust: 0.8

db:BUGTRAQid:20090313 APPLE ITUNES DAAP MESSAGES HANDLING DENIAL OF SERVICE VULNERABILITY

Trust: 0.6

db:APPLEid:APPLE-SA-2009-03-11

Trust: 0.6

db:FULLDISCid:20090312 APPLE ITUNES DAAP MESSAGES HANDLING DENIAL OF SERVICE VULNERABILITY

Trust: 0.6

db:XFid:49200

Trust: 0.6

db:CNNVDid:CNNVD-200903-261

Trust: 0.6

db:PACKETSTORMid:75707

Trust: 0.2

db:VULHUBid:VHN-37462

Trust: 0.1

db:PACKETSTORMid:75695

Trust: 0.1

sources: VULHUB: VHN-37462 // BID: 34094 // JVNDB: JVNDB-2009-001498 // PACKETSTORM: 75707 // PACKETSTORM: 75695 // CNNVD: CNNVD-200903-261 // NVD: CVE-2009-0016

REFERENCES

url:http://support.apple.com/kb/ht3487

Trust: 2.2

url:http://www.fortiguardcenter.com/advisory/fga-2009-11.html

Trust: 2.1

url:http://lists.apple.com/archives/security-announce//2009/mar/msg00001.html

Trust: 1.7

url:http://www.securityfocus.com/bid/34094

Trust: 1.7

url:http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0236.html

Trust: 1.7

url:http://osvdb.org/52578

Trust: 1.7

url:http://securitytracker.com/id?1021842

Trust: 1.7

url:http://secunia.com/advisories/34254

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/0702

Trust: 1.7

url:http://www.securityfocus.com/archive/1/501758/100/0/threaded

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6001

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/49200

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0016

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0016

Trust: 0.8

url:/archive/1/501758

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/49200

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/501758/100/0/threaded

Trust: 0.6

url:http://www.apple.com/itunes/

Trust: 0.3

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0016

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/34254/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/advisories/try_vi/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-37462 // BID: 34094 // JVNDB: JVNDB-2009-001498 // PACKETSTORM: 75707 // PACKETSTORM: 75695 // CNNVD: CNNVD-200903-261 // NVD: CVE-2009-0016

CREDITS

Xiaopeng Zhang

Trust: 0.6

sources: CNNVD: CNNVD-200903-261

SOURCES

db:VULHUBid:VHN-37462
db:BIDid:34094
db:JVNDBid:JVNDB-2009-001498
db:PACKETSTORMid:75707
db:PACKETSTORMid:75695
db:CNNVDid:CNNVD-200903-261
db:NVDid:CVE-2009-0016

LAST UPDATE DATE

2025-04-10T23:22:15.993000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-37462date:2018-10-11T00:00:00
db:BIDid:34094date:2009-03-13T14:46:00
db:JVNDBid:JVNDB-2009-001498date:2009-06-30T00:00:00
db:CNNVDid:CNNVD-200903-261date:2009-03-21T00:00:00
db:NVDid:CVE-2009-0016date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-37462date:2009-03-14T00:00:00
db:BIDid:34094date:2009-03-11T00:00:00
db:JVNDBid:JVNDB-2009-001498date:2009-06-30T00:00:00
db:PACKETSTORMid:75707date:2009-03-13T21:14:01
db:PACKETSTORMid:75695date:2009-03-12T06:51:47
db:CNNVDid:CNNVD-200903-261date:2009-03-14T00:00:00
db:NVDid:CVE-2009-0016date:2009-03-14T18:30:00.420