ID

VAR-201605-0398


CVE

CVE-2016-1742


TITLE

Apple iTunes Vulnerability that can be obtained by the right installer

Trust: 0.8

sources: JVNDB: JVNDB-2016-002783

DESCRIPTION

Untrusted search path vulnerability in the installer in Apple iTunes before 12.4 allows local users to gain privileges via a Trojan horse DLL in the current working directory. DLL You may get permission through. iTunes is prone to a remote code-execution vulnerability. An attacker can leverage this issue to execute arbitrary code with system privileges. Failed exploit attempts will likely result in denial-of-service conditions. Versions prior to iTunes 12.4 are vulnerable. Apple iTunes is a set of media player applications of Apple (Apple), which is mainly used for playing and managing digital music and video files. The vulnerability stems from a dynamic library loading problem during the installation process of the program. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2016-05-16-6 iTunes 12.4 iTunes 12.4 is now available and addresses the following: iTunes Available for: Windows 7 and later Impact: Running the iTunes installer in an untrusted directory may have resulted in arbitrary code execution Description: A dynamic library loading issue existed in iTunes setup. This was addressed through improved path searching. CVE-ID CVE-2016-1742 : Stefan Kanthak and YoKo Kho (yokoacc) of MII - Consulting & Advisory Svc. Dept. iTunes 12.4 may be obtained from: http://www.apple.com/itunes/download/ Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJXOj0OAAoJEIOj74w0bLRGjA0QANTHzjNUsByxmLOpQfNcEHEy 3lXFmf00E7C6lq7DgQMPfbYOgXz+lAJuUuyt88OK6k9w+ADm+huxna6O+Gy4f+ST W1T2eu78vJG42QRji1f9PAa8M9roQjziL35iCRZCpeN5kLwXK8BHGSjvB33hjkGy a7GzWuT27iwUcEvTHSWACYtVqfDYre5l4Jyk0/CviWgb7zms7HC+SBbAGS3TfZRh LxT2JeF+dQ4Ajug21O8IJrOJtNwgppkssrSqtvVezYNvmTVuELPtm+5Mo0Ggqhr7 vo3SxcOvZ7xqyA9F2klLV27oity7FLMXg2NyqWnngpRJoxnnck8PcB9/FSGpVpWt /RmF6zIII792jfcmRYhe8IwgbpO6w8r4o4dJX3FLuWmk1HajT9itgZkMPIIfUdP7 hxvfmK4GBv09AP/o+oXi+Zoq3X0HbZhp+djcI9hx0T9a1bw7g0H31g54NMhqCxez vl0M04Y3+GmtXuIJNIzJuuIh4JMMfGN9SXO5NAzFzOlQ6bn96/uR9o4e+2LAuH29 HuACxqu6gaOOt/bv0AOSloPyIOSnfgH1v5Zt9QV2qDpChTSPqL0b5nnqwcv5yv7l InSa1oWL+WJ1FSlB7dLC01Sii4uRTC6Oud+ShWsoqMKYJouODqry8hlIG4Qqzexl fnEDC7oEvN/gpW1EXu7v =Aip6 -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2016-1742 // JVNDB: JVNDB-2016-002783 // BID: 90688 // VULHUB: VHN-90561 // VULMON: CVE-2016-1742 // PACKETSTORM: 137090

AFFECTED PRODUCTS

vendor:applemodel:itunesscope:lteversion:12.3.1

Trust: 1.0

vendor:applemodel:itunesscope:ltversion:12.4 (windows 7 or later )

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:12.3.1

Trust: 0.6

vendor:microsoftmodel:windowsscope:eqversion:7

Trust: 0.3

vendor:esignalmodel:esignalscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.2.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.7.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.7

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.6

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.2.72

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0.2.20

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10

Trust: 0.3

sources: BID: 90688 // JVNDB: JVNDB-2016-002783 // CNNVD: CNNVD-201605-539 // NVD: CVE-2016-1742

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1742
value: HIGH

Trust: 1.0

NVD: CVE-2016-1742
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201605-539
value: HIGH

Trust: 0.6

VULHUB: VHN-90561
value: HIGH

Trust: 0.1

VULMON: CVE-2016-1742
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-1742
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-90561
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1742
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-90561 // VULMON: CVE-2016-1742 // JVNDB: JVNDB-2016-002783 // CNNVD: CNNVD-201605-539 // NVD: CVE-2016-1742

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-90561 // JVNDB: JVNDB-2016-002783 // NVD: CVE-2016-1742

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201605-539

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201605-539

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-002783

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2016-05-16-6 iTunes 12.4url:http://lists.apple.com/archives/security-announce/2016/May/msg00006.html

Trust: 0.8

title:HT206379url:https://support.apple.com/en-us/HT206379

Trust: 0.8

title:HT206379url:https://support.apple.com/ja-jp/HT206379

Trust: 0.8

title:Apple iTunes Fixes for arbitrary code execution vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61853

Trust: 0.6

title:Apple: iTunes 12.4url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=8fd25feee5d852833f5cd32a4d18a89c

Trust: 0.1

sources: VULMON: CVE-2016-1742 // JVNDB: JVNDB-2016-002783 // CNNVD: CNNVD-201605-539

EXTERNAL IDS

db:NVDid:CVE-2016-1742

Trust: 3.0

db:SECTRACKid:1035887

Trust: 1.2

db:JVNid:JVNVU91632741

Trust: 0.8

db:JVNDBid:JVNDB-2016-002783

Trust: 0.8

db:CNNVDid:CNNVD-201605-539

Trust: 0.7

db:AUSCERTid:ESB-2016.1237

Trust: 0.6

db:BIDid:90688

Trust: 0.5

db:PACKETSTORMid:137090

Trust: 0.2

db:VULHUBid:VHN-90561

Trust: 0.1

db:VULMONid:CVE-2016-1742

Trust: 0.1

sources: VULHUB: VHN-90561 // VULMON: CVE-2016-1742 // BID: 90688 // JVNDB: JVNDB-2016-002783 // PACKETSTORM: 137090 // CNNVD: CNNVD-201605-539 // NVD: CVE-2016-1742

REFERENCES

url:http://lists.apple.com/archives/security-announce/2016/may/msg00006.html

Trust: 1.8

url:https://support.apple.com/ht206379

Trust: 1.8

url:http://www.securitytracker.com/id/1035887

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1742

Trust: 0.8

url:http://jvn.jp/vu/jvnvu91632741/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1742

Trust: 0.8

url:https://www.auscert.org.au/render.html?it=34702

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://www.securityfocus.com/bid/90688

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://support.apple.com/kb/ht206379

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1742

Trust: 0.1

url:http://www.apple.com/itunes/download/

Trust: 0.1

url:http://support.apple.com/kb/ht201222

Trust: 0.1

sources: VULHUB: VHN-90561 // VULMON: CVE-2016-1742 // JVNDB: JVNDB-2016-002783 // PACKETSTORM: 137090 // CNNVD: CNNVD-201605-539 // NVD: CVE-2016-1742

CREDITS

Stefan Kanthak and YoKo Kho (yokoacc) of MII - Consulting & Advisory Svc. Dept.

Trust: 0.3

sources: BID: 90688

SOURCES

db:VULHUBid:VHN-90561
db:VULMONid:CVE-2016-1742
db:BIDid:90688
db:JVNDBid:JVNDB-2016-002783
db:PACKETSTORMid:137090
db:CNNVDid:CNNVD-201605-539
db:NVDid:CVE-2016-1742

LAST UPDATE DATE

2025-04-13T20:11:40.209000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-90561date:2016-12-01T00:00:00
db:VULMONid:CVE-2016-1742date:2016-12-01T00:00:00
db:BIDid:90688date:2016-05-16T00:00:00
db:JVNDBid:JVNDB-2016-002783date:2016-05-23T00:00:00
db:CNNVDid:CNNVD-201605-539date:2016-05-25T00:00:00
db:NVDid:CVE-2016-1742date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-90561date:2016-05-20T00:00:00
db:VULMONid:CVE-2016-1742date:2016-05-20T00:00:00
db:BIDid:90688date:2016-05-16T00:00:00
db:JVNDBid:JVNDB-2016-002783date:2016-05-23T00:00:00
db:PACKETSTORMid:137090date:2016-05-17T16:12:46
db:CNNVDid:CNNVD-201605-539date:2016-05-20T00:00:00
db:NVDid:CVE-2016-1742date:2016-05-20T10:59:01.230