ID

VAR-201203-0112


CVE

CVE-2012-0634


TITLE

Apple iTunes Used in WebKit Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2012-001716

DESCRIPTION

WebKit, as used in Apple iTunes before 10.6, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2012-03-07-1. WebKit is prone to multiple unspecified memory-corruption vulnerabilities. An attacker can exploit these issues by enticing an unsuspecting user into visiting a malicious webpage with a vulnerable application. Few technical details are currently available. We will update this BID when more information emerges. Successful exploits will allow attackers to execute arbitrary code in the context of the affected browser or cause denial-of-service conditions; other attacks may also be possible. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. A vulnerability exists when WebKit is used in versions prior to Apple iTunes 10.6. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Apple iTunes Multiple WebKit Vulnerabilities SECUNIA ADVISORY ID: SA48274 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48274/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48274 RELEASE DATE: 2012-03-09 DISCUSS ADVISORY: http://secunia.com/advisories/48274/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48274/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48274 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Apple iTunes, which can be exploited by malicious people to compromise a user's system. 1) Multiple errors in the WebKit component can be exploited to corrupt memory via Man-in-the-Middle (MitM) attacks. SOLUTION: Update to version 10.6. PROVIDED AND/OR DISCOVERED BY: 1) Reported by the vendor. The vendor also credits: Abhishek Arya of Google Chrome Security Team, wushi of team509 via ZDI, and Jeremy Apthorp of Google. ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT5191 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2012-0634 // JVNDB: JVNDB-2012-001716 // BID: 52363 // VULHUB: VHN-53915 // PACKETSTORM: 110644

AFFECTED PRODUCTS

vendor:applemodel:itunesscope:eqversion:10.5.1

Trust: 1.9

vendor:applemodel:itunesscope:eqversion:10.5

Trust: 1.9

vendor:applemodel:itunesscope:eqversion:10.4

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:10.3

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:10.5.2

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:10.3.1

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:10.4.1

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:10.1.2

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:10.2

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:10.1

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:5.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.7.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.0

Trust: 1.0

vendor:applemodel:webkitscope:eqversion:*

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.5.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.6.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.2.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.3.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.8.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.1.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.2.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.7.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.7.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.4

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:5.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.3.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.1.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.1.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.2.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.7.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.7.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.0.0

Trust: 1.0

vendor:applemodel:itunesscope:lteversion:10.5.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.1.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.3.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.9.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.5

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.1.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.5.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.0.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:itunesscope:ltversion:10.6

Trust: 0.8

vendor:applemodel:webkitscope: - version: -

Trust: 0.6

vendor:applemodel:itunesscope:eqversion:10.5.3

Trust: 0.6

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.5

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.3

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.2

Trust: 0.3

vendor:webkitmodel:open source project webkit r82222scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r77705scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r52833scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r52401scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r51295scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r38566scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.x

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.2-1

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.1.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:5.1.4

Trust: 0.3

vendor:applemodel:safariscope:neversion:5.1.4

Trust: 0.3

vendor:applemodel:itunesscope:neversion:10.6

Trust: 0.3

sources: BID: 52363 // JVNDB: JVNDB-2012-001716 // CNNVD: CNNVD-201203-140 // NVD: CVE-2012-0634

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0634
value: HIGH

Trust: 1.0

NVD: CVE-2012-0634
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201203-140
value: HIGH

Trust: 0.6

VULHUB: VHN-53915
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-0634
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-53915
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-53915 // JVNDB: JVNDB-2012-001716 // CNNVD: CNNVD-201203-140 // NVD: CVE-2012-0634

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-53915 // JVNDB: JVNDB-2012-001716 // NVD: CVE-2012-0634

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201203-140

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201203-140

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001716

PATCH

title:HT5191url:http://support.apple.com/kb/HT5191

Trust: 0.8

sources: JVNDB: JVNDB-2012-001716

EXTERNAL IDS

db:NVDid:CVE-2012-0634

Trust: 2.8

db:BIDid:52363

Trust: 1.4

db:SECUNIAid:48274

Trust: 1.2

db:JVNDBid:JVNDB-2012-001716

Trust: 0.8

db:CNNVDid:CNNVD-201203-140

Trust: 0.7

db:APPLEid:APPLE-SA-2012-03-07-1

Trust: 0.6

db:NSFOCUSid:18987

Trust: 0.6

db:NSFOCUSid:19030

Trust: 0.6

db:VULHUBid:VHN-53915

Trust: 0.1

db:PACKETSTORMid:110644

Trust: 0.1

sources: VULHUB: VHN-53915 // BID: 52363 // JVNDB: JVNDB-2012-001716 // PACKETSTORM: 110644 // CNNVD: CNNVD-201203-140 // NVD: CVE-2012-0634

REFERENCES

url:http://lists.apple.com/archives/security-announce/2012/mar/msg00000.html

Trust: 1.7

url:http://www.securityfocus.com/bid/52363

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a17365

Trust: 1.1

url:http://secunia.com/advisories/48274

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0634

Trust: 0.8

url:http://jvn.jp/cert/jvnvu479643

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0634

Trust: 0.8

url:http://www.nsfocus.net/vulndb/19030

Trust: 0.6

url:http://www.nsfocus.net/vulndb/18987

Trust: 0.6

url:http://www.apple.com/itunes/

Trust: 0.3

url:http://www.webkit.org/

Trust: 0.3

url:http://support.apple.com/kb/ht5191

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48274

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/48274/

Trust: 0.1

url:http://secunia.com/advisories/48274/#comments

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-53915 // BID: 52363 // JVNDB: JVNDB-2012-001716 // PACKETSTORM: 110644 // CNNVD: CNNVD-201203-140 // NVD: CVE-2012-0634

CREDITS

Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer, wushi of team509 working with TippingPoint's Zero Day Initiative, Jeremy Apthorp of Google, Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer, Apple.

Trust: 0.3

sources: BID: 52363

SOURCES

db:VULHUBid:VHN-53915
db:BIDid:52363
db:JVNDBid:JVNDB-2012-001716
db:PACKETSTORMid:110644
db:CNNVDid:CNNVD-201203-140
db:NVDid:CVE-2012-0634

LAST UPDATE DATE

2025-04-11T19:43:55.489000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-53915date:2018-01-05T00:00:00
db:BIDid:52363date:2012-03-12T19:50:00
db:JVNDBid:JVNDB-2012-001716date:2012-03-13T00:00:00
db:CNNVDid:CNNVD-201203-140date:2012-04-01T00:00:00
db:NVDid:CVE-2012-0634date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-53915date:2012-03-08T00:00:00
db:BIDid:52363date:2012-03-08T00:00:00
db:JVNDBid:JVNDB-2012-001716date:2012-03-13T00:00:00
db:PACKETSTORMid:110644date:2012-03-11T05:31:55
db:CNNVDid:CNNVD-201203-140date:2012-03-08T00:00:00
db:NVDid:CVE-2012-0634date:2012-03-08T22:55:03.900