ID

VAR-201305-0250


CVE

CVE-2013-1014


TITLE

Apple iTunes In HTTPS Vulnerabilities spoofing servers

Trust: 0.8

sources: JVNDB: JVNDB-2013-002769

DESCRIPTION

Apple iTunes before 11.0.3 does not properly verify X.509 certificates, which allows man-in-the-middle attackers to spoof HTTPS servers via an arbitrary valid certificate. An attacker can exploit this issue to perform man-in-the-middle attacks and disclose sensitive information, which will aid in further attacks. Apple iTunes is a set of media player applications of Apple (Apple), which is mainly used for playing and managing digital music and video files. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2013-05-16-1 iTunes 11.0.3 iTunes 11.0.3 is now available and addresses the following: iTunes Available for: Mac OS X v10.6.8 or later, Windows 7, Vista, XP SP2 or later Impact: An attacker in a privileged network position may manipulate HTTPS server certificates, leading to the disclosure of sensitive information Description: A certificate validation issue existed in iTunes. In certain contexts, an active network attacker could present untrusted certificates to iTunes and they would be accepted without warning. This issue was resolved by improved certificate validation. CVE-ID CVE-2013-1014 : Christopher of ThinkSECURE Pte Ltd, Christopher Hickstein of University of Minnesota iTunes Available for: Windows 7, Vista, XP SP2 or later Impact: A man-in-the-middle attack while browsing the iTunes Store via iTunes may lead to an unexpected application termination or arbitrary code executionn Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2012-2824 : miaubiz CVE-2012-2857 : Arthur Gerkis CVE-2012-3748 : Joost Pol and Daan Keuper of Certified Secure working with HP TippingPoint's Zero Day Initiative CVE-2012-5112 : Pinkie Pie working with Google's Pwnium 2 contest CVE-2013-0879 : Atte Kettunen of OUSPG CVE-2013-0912 : Nils and Jon from MWR Labs working with HP TippingPoint's Zero Day Initiative CVE-2013-0948 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2013-0949 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2013-0950 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2013-0951 : Apple CVE-2013-0952 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2013-0953 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2013-0954 : Dominic Cooney of Google and Martin Barbella of the Google Chrome Security Team CVE-2013-0955 : Apple CVE-2013-0956 : Apple Product Security CVE-2013-0958 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2013-0959 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2013-0960 : Apple CVE-2013-0961 : wushi of team509 working with iDefense VCP CVE-2013-0991 : Jay Civelli of the Chromium development community CVE-2013-0992 : Google Chrome Security Team (Martin Barbella) CVE-2013-0993 : Google Chrome Security Team (Inferno) CVE-2013-0994 : David German of Google CVE-2013-0995 : Google Chrome Security Team (Inferno) CVE-2013-0996 : Google Chrome Security Team (Inferno) CVE-2013-0997 : Vitaliy Toropov working with HP TippingPoint's Zero Day Initiative CVE-2013-0998 : pa_kt working with HP TippingPoint's Zero Day Initiative CVE-2013-0999 : pa_kt working with HP TippingPoint's Zero Day Initiative CVE-2013-1000 : Fermin J. Serna of the Google Security Team CVE-2013-1001 : Ryan Humenick CVE-2013-1002 : Sergey Glazunov CVE-2013-1003 : Google Chrome Security Team (Inferno) CVE-2013-1004 : Google Chrome Security Team (Martin Barbella) CVE-2013-1005 : Google Chrome Security Team (Martin Barbella) CVE-2013-1006 : Google Chrome Security Team (Martin Barbella) CVE-2013-1007 : Google Chrome Security Team (Inferno) CVE-2013-1008 : Sergey Glazunov CVE-2013-1010 : miaubiz CVE-2013-1011 : Google Chrome Security Team (Inferno) iTunes 11.0.3 may be obtained from: http://www.apple.com/itunes/download/ For OS X: The download file is named: "iTunes11.0.3.dmg" Its SHA-1 digest is: 83f4afc5d3b5698c811c87c27b975824116bbf1d For Windows XP / Vista / Windows 7: The download file is named: "iTunesSetup.exe" Its SHA-1 digest is: 1e95101b584762b3c46ab597c115cd86bfd45d64 For 64-bit Windows XP / Vista / Windows 7: The download file is named: "iTunes64Setup.exe" Its SHA-1 digest is: 6669044bd50c1f753c8412a02556a70be09fd9f8 Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJRlQ9KAAoJEPefwLHPlZEwbhcP+QHZGEAVCTw4+Z5k67ninaCS BV11pa8iySzuv0XZ9Se+CsI37IT1P3bVqEw/A+1i989Q00kaGCBNyt9m65krxNVX EhFLB8IxCfZqpM4C8ENhOkrY05iOfLx/DW7ioYM9TGTckpb6ayKkUBHkqn+bY3Hq b9rVeulzPfNsm1QtNp9eRGAL5Kq8vgEAlrMebUF1vOQ8CvGoGNplk0xRBm3Wg0im gCal7A/fwp9OQUnmlUMeASgbX+Q94ytM6RbPVXwiL1ghTK4bO2LEW1PXdp58cWhv kNtqO8eOokMl6wwLI6T69GmyfvoL7p5FcDRvuLCtzf2R9j6JgkXYMamP2Mbpr4d3 xlNS2slJQfyRVELnJOv8bxl7Fi2EpBQtUe4WRk7StNWf34kwAb7lWUd1amfIWNcp lZSojjpShrA7zz82FZxt3q79Tq7Y398FH7ObcJVCWdbCI89TsoBujkP/P6lcp6mz TnRVLZq6xWnWz1SUsvM5qBfb1LjUREvKDc1anWVaiqW2BJEF0Mc87hkyL5q6YrIv VyUFBT5cJIqAKUD7MzsUjDMIsyXALVyj9zh1lJ0+c8QdCjPetk8tUg6TCun0nw95 nkFYZJcHDZVLzn8rC/GoE2x8CwhFwN8ATzeS/zV9vxTJ1sHBN+ewkez8i8YTIj+y 9M/53y+vsPwrcmmXCS3o =eN5K -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2013-1014 // JVNDB: JVNDB-2013-002769 // BID: 59941 // VULHUB: VHN-61016 // VULMON: CVE-2013-1014 // PACKETSTORM: 121672

AFFECTED PRODUCTS

vendor:applemodel:itunesscope:eqversion:4.6.0

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:4.7.0

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:4.8.0

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:4.7.1

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:4.6

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:4.7

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:4.5.0

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:4.9.0

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:4.7.2

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:10.5.1

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:10.6

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:10.5

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:10.2

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:10.1

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:7.6

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:5.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.5.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.3.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.1.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.2.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.1.1.4

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.7.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:5.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.3.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.1.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.2.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.2.2.12

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:5.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.1.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.3.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.4.1.10

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.4.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.5

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.1.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.0.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.5

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.7.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.2.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.5.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.6.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.4

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.5.1.42

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.4

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.1.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.5.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.7

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.4.0.80

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.6.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:4.5

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.3.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.1.2

Trust: 1.0

vendor:applemodel:itunesscope:lteversion:11.0.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:itunesscope:ltversion:11.0.3 (windows and mac os x v10.6.8 or later )

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:11.0.2

Trust: 0.6

vendor:applemodel:itunesscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10

Trust: 0.3

sources: BID: 59941 // JVNDB: JVNDB-2013-002769 // CNNVD: CNNVD-201305-369 // NVD: CVE-2013-1014

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1014
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-1014
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201305-369
value: MEDIUM

Trust: 0.6

VULHUB: VHN-61016
value: MEDIUM

Trust: 0.1

VULMON: CVE-2013-1014
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-1014
severity: MEDIUM
baseScore: 4.3
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-61016
severity: MEDIUM
baseScore: 4.3
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-61016 // VULMON: CVE-2013-1014 // JVNDB: JVNDB-2013-002769 // CNNVD: CNNVD-201305-369 // NVD: CVE-2013-1014

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-61016 // JVNDB: JVNDB-2013-002769 // NVD: CVE-2013-1014

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201305-369

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201305-369

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002769

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-61016

PATCH

title:APPLE-SA-2013-05-16-1url:http://lists.apple.com/archives/security-announce/2013/May/msg00000.html

Trust: 0.8

title:HT5766url:http://support.apple.com/kb/HT5766

Trust: 0.8

title:HT5766url:http://support.apple.com/kb/HT5766?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2013-002769

EXTERNAL IDS

db:NVDid:CVE-2013-1014

Trust: 3.0

db:BIDid:59941

Trust: 1.1

db:JVNid:JVNVU92876220

Trust: 0.8

db:JVNDBid:JVNDB-2013-002769

Trust: 0.8

db:CNNVDid:CNNVD-201305-369

Trust: 0.7

db:APPLEid:APPLE-SA-2013-05-16-1

Trust: 0.6

db:SECUNIAid:53471

Trust: 0.6

db:PACKETSTORMid:121672

Trust: 0.2

db:VULHUBid:VHN-61016

Trust: 0.1

db:VULMONid:CVE-2013-1014

Trust: 0.1

sources: VULHUB: VHN-61016 // VULMON: CVE-2013-1014 // BID: 59941 // JVNDB: JVNDB-2013-002769 // PACKETSTORM: 121672 // CNNVD: CNNVD-201305-369 // NVD: CVE-2013-1014

REFERENCES

url:http://lists.apple.com/archives/security-announce/2013/may/msg00000.html

Trust: 1.8

url:http://support.apple.com/kb/ht5766

Trust: 1.8

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a17605

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1014

Trust: 0.8

url:http://jvn.jp/cert/jvnvu92876220/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1014

Trust: 0.8

url:http://www.securityfocus.com/bid/59941

Trust: 0.7

url:http://secunia.com/advisories/53471

Trust: 0.6

url:http://www.apple.com/itunes/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0997

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0912

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0956

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0996

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0879

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0961

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0954

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0992

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0960

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0955

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0995

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0948

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0959

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0952

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1014

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0958

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0949

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0993

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3748

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2857

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0991

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0950

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0994

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0951

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0998

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2824

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0953

Trust: 0.1

url:http://www.apple.com/itunes/download/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5112

Trust: 0.1

sources: VULHUB: VHN-61016 // VULMON: CVE-2013-1014 // BID: 59941 // JVNDB: JVNDB-2013-002769 // PACKETSTORM: 121672 // CNNVD: CNNVD-201305-369 // NVD: CVE-2013-1014

CREDITS

Christopher of ThinkSECURE Pte Ltd and Christopher Hickstein of University of Minnesota

Trust: 0.9

sources: BID: 59941 // CNNVD: CNNVD-201305-369

SOURCES

db:VULHUBid:VHN-61016
db:VULMONid:CVE-2013-1014
db:BIDid:59941
db:JVNDBid:JVNDB-2013-002769
db:PACKETSTORMid:121672
db:CNNVDid:CNNVD-201305-369
db:NVDid:CVE-2013-1014

LAST UPDATE DATE

2025-04-11T20:06:48.407000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-61016date:2018-10-30T00:00:00
db:VULMONid:CVE-2013-1014date:2018-10-30T00:00:00
db:BIDid:59941date:2013-05-16T00:00:00
db:JVNDBid:JVNDB-2013-002769date:2013-06-13T00:00:00
db:CNNVDid:CNNVD-201305-369date:2013-05-21T00:00:00
db:NVDid:CVE-2013-1014date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-61016date:2013-05-20T00:00:00
db:VULMONid:CVE-2013-1014date:2013-05-20T00:00:00
db:BIDid:59941date:2013-05-16T00:00:00
db:JVNDBid:JVNDB-2013-002769date:2013-05-21T00:00:00
db:PACKETSTORMid:121672date:2013-05-17T13:33:33
db:CNNVDid:CNNVD-201305-369date:2013-05-20T00:00:00
db:NVDid:CVE-2013-1014date:2013-05-20T14:44:35.207