ID

VAR-201006-0323


CVE

CVE-2010-1769


TITLE

Apple iTunes of WebKit Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2010-001668

DESCRIPTION

WebKit in Apple iTunes before 9.2 on Windows, and Apple iOS before 4 on the iPhone and iPod touch, accesses out-of-bounds memory during the handling of tables, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document, a different vulnerability than CVE-2010-1387 and CVE-2010-1763. WebKit is prone to a remote code-execution vulnerability. An attacker can exploit this issue by enticing an unsuspecting user into viewing a malicious webpage. Failed exploit attempts will result in a denial-of-service condition. Apple iOS for iPhone and iPod touch is prone to multiple security vulnerabilities, including information-disclosure, remote code-execution, denial-of-service, security-bypass, and spoofing issues. These issues affect the Sandbox, CFNetwork, ImageIO, Passcode Lock, Safari, Settings, and WebKit components. Successfully exploiting these issues may allow attackers to crash the affected device, bypass security restrictions, obtain sensitive information, or execute arbitrary code. Other attacks are also possible. Versions prior to iOS 4 are vulnerable. This BID is being retired. ---------------------------------------------------------------------- Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management Free webinars http://secunia.com/vulnerability_scanning/corporate/webinars/ ---------------------------------------------------------------------- TITLE: Apple iTunes Multiple Vulnerabilities SECUNIA ADVISORY ID: SA40196 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40196/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40196 RELEASE DATE: 2010-06-25 DISCUSS ADVISORY: http://secunia.com/advisories/40196/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/40196/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=40196 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Apple iTunes. 1) An error when processing ColorSync profiles embedded in a specially crafted image can be exploited to cause a heap-based buffer overflow and potentially execute arbitrary code. This is related to vulnerability #3 in: SA36096 2) Multiple integer overflows when processing TIFF files can be exploited to cause a heap-based buffer overflow and potentially execute arbitrary code. For more information: SA37931 SA40105 4) One unspecified vulnerability with an unknown impact has been reported in WebKit included in iTunes. No further information is currently available. 5) Two vulnerabilities in WebKit can be exploited by malicious people to compromise a user's system. For more information see vulnerability #14 and 15 in: SA40257 SOLUTION: Update to version 9.2. PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Chris Evans of the Google Security Team and Andrzej Dyjak. 2) The vendor credits Kevin Finisterre, digitalmunition.com. 4) Reported by the vendor. ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT4220 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM)

Trust: 2.43

sources: NVD: CVE-2010-1769 // JVNDB: JVNDB-2010-001668 // BID: 41054 // BID: 41016 // VULHUB: VHN-44374 // PACKETSTORM: 91028 // PACKETSTORM: 97846

AFFECTED PRODUCTS

vendor:applemodel:itunesscope:eqversion:7.3.0

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.4.1

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.4.3

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.1.1

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.3.1

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.6.2

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.6

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.5

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.7

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.4.0

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:9.0

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:9.1

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:8.2

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:8.1

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:8.0

Trust: 1.3

vendor:applemodel:itunesscope:lteversion:9.1.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.7.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.0.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.5.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.2.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.1.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.7.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.1.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.2.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.3.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.0.3

Trust: 1.0

vendor:applemodel:iosscope:eqversion:2.0 to 3.1.3

Trust: 0.8

vendor:applemodel:ios for ipod touchscope:eqversion:2.1 to 3.1.3

Trust: 0.8

vendor:applemodel:iphonescope: - version: -

Trust: 0.8

vendor:applemodel:ipod touchscope: - version: -

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:9

Trust: 0.8

vendor:applemodel:ipod touchscope:eqversion:3.1.3

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:3.1.2

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:3.1.1

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:3.0

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:3.1.3

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:3.1.2

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:3.0.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:3.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:3.0

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.6

vendor:applemodel:iosscope:neversion:4

Trust: 0.6

vendor:webkitmodel:open source project webkit r52833scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r52401scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r51295scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r38566scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0.2.20

Trust: 0.3

vendor:applemodel:itunesscope:neversion:9.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

sources: BID: 41054 // BID: 41016 // JVNDB: JVNDB-2010-001668 // CNNVD: CNNVD-201006-314 // NVD: CVE-2010-1769

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-1769
value: HIGH

Trust: 1.0

NVD: CVE-2010-1769
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201006-314
value: CRITICAL

Trust: 0.6

VULHUB: VHN-44374
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-1769
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-44374
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-44374 // JVNDB: JVNDB-2010-001668 // CNNVD: CNNVD-201006-314 // NVD: CVE-2010-1769

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2010-1769

THREAT TYPE

network

Trust: 0.6

sources: BID: 41054 // BID: 41016

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201006-314

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001668

PATCH

title:HT4220url:http://support.apple.com/kb/HT4220

Trust: 0.8

title:HT4225url:http://support.apple.com/kb/HT4225

Trust: 0.8

title:HT4220url:http://support.apple.com/kb/HT4220?viewlocale=ja_JP

Trust: 0.8

title:HT4225url:http://support.apple.com/kb/HT4225?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2010-001668

EXTERNAL IDS

db:NVDid:CVE-2010-1769

Trust: 2.8

db:SECTRACKid:1024108

Trust: 2.5

db:SECUNIAid:40196

Trust: 2.0

db:VUPENid:ADV-2010-1512

Trust: 1.9

db:BIDid:41016

Trust: 1.4

db:SECUNIAid:43068

Trust: 1.2

db:VUPENid:ADV-2011-0212

Trust: 1.1

db:XFid:59508

Trust: 0.8

db:JVNDBid:JVNDB-2010-001668

Trust: 0.8

db:CNNVDid:CNNVD-201006-314

Trust: 0.7

db:APPLEid:APPLE-SA-2010-06-16-1

Trust: 0.6

db:BIDid:41054

Trust: 0.4

db:VULHUBid:VHN-44374

Trust: 0.1

db:PACKETSTORMid:91028

Trust: 0.1

db:PACKETSTORMid:97846

Trust: 0.1

sources: VULHUB: VHN-44374 // BID: 41054 // BID: 41016 // JVNDB: JVNDB-2010-001668 // PACKETSTORM: 91028 // PACKETSTORM: 97846 // CNNVD: CNNVD-201006-314 // NVD: CVE-2010-1769

REFERENCES

url:http://securitytracker.com/id?1024108

Trust: 2.5

url:http://secunia.com/advisories/40196

Trust: 1.9

url:http://www.vupen.com/english/advisories/2010/1512

Trust: 1.9

url:http://support.apple.com/kb/ht4220

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2010//jun/msg00002.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2010/jun/msg00003.html

Trust: 1.1

url:http://www.securityfocus.com/bid/41016

Trust: 1.1

url:http://support.apple.com/kb/ht4225

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7178

Trust: 1.1

url:http://secunia.com/advisories/43068

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0212

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/59508

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1769

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/59508

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1769

Trust: 0.8

url:http://www.apple.com/iphone/softwareupdate/

Trust: 0.6

url:http://www.apple.com/iphone/

Trust: 0.6

url:http://www.apple.com/ipodtouch/

Trust: 0.6

url:http://secunia.com/products/corporate/evm/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/advisories/40196/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=40196

Trust: 0.1

url:http://secunia.com/advisories/40196/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/webinars/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=43068

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:http://secunia.com/advisories/43068/#comments

Trust: 0.1

url:http://secunia.com/advisories/43068/

Trust: 0.1

sources: VULHUB: VHN-44374 // BID: 41054 // BID: 41016 // JVNDB: JVNDB-2010-001668 // PACKETSTORM: 91028 // PACKETSTORM: 97846 // CNNVD: CNNVD-201006-314 // NVD: CVE-2010-1769

CREDITS

wushi of team509

Trust: 0.3

sources: BID: 41054

SOURCES

db:VULHUBid:VHN-44374
db:BIDid:41054
db:BIDid:41016
db:JVNDBid:JVNDB-2010-001668
db:PACKETSTORMid:91028
db:PACKETSTORMid:97846
db:CNNVDid:CNNVD-201006-314
db:NVDid:CVE-2010-1769

LAST UPDATE DATE

2025-04-11T19:36:17.962000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-44374date:2017-09-19T00:00:00
db:BIDid:41054date:2010-06-21T00:00:00
db:BIDid:41016date:2010-06-23T16:08:00
db:JVNDBid:JVNDB-2010-001668date:2010-07-13T00:00:00
db:CNNVDid:CNNVD-201006-314date:2010-06-23T00:00:00
db:NVDid:CVE-2010-1769date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-44374date:2010-06-18T00:00:00
db:BIDid:41054date:2010-06-21T00:00:00
db:BIDid:41016date:2010-06-21T00:00:00
db:JVNDBid:JVNDB-2010-001668date:2010-07-13T00:00:00
db:PACKETSTORMid:91028date:2010-06-25T14:14:55
db:PACKETSTORMid:97846date:2011-01-25T03:59:20
db:CNNVDid:CNNVD-201006-314date:2010-06-23T00:00:00
db:NVDid:CVE-2010-1769date:2010-06-18T16:30:01.453