Vulnerabilities > CVE-2005-1248 - Unspecified vulnerability in Apple Itunes

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
apple
nessus

Summary

Buffer overflow in Apple iTunes before 4.8 allows remote attackers to execute arbitrary code via a crafted MPEG4 file.

Vulnerable Configurations

Part Description Count
Application
Apple
5

Nessus

NASL familyMacOS X Local Security Checks
NASL idMACOSX_ITUNES_OVERFLOW2.NASL
descriptionThe remote host is running a version of iTunes which is older than version 4.8.0. Such versions reportedly fail to perform certain validation checks on MPEG4 files, and hence it could be possible to trigger a buffer overflow condition. Successful exploitation of this issue could lead to a denial of service condition or arbitrary code execution on the remote system.
last seen2020-06-01
modified2020-06-02
plugin id18214
published2005-05-09
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/18214
titleiTunes < 4.8.0 MPEG-4 Parsing Overflow (Mac OS X)
code
#
# (C) Tenable Network Security, Inc.
#

if ( ! defined_func("bn_random") ) exit(0);

include("compat.inc");

if(description)
{
 script_id(18214);
 script_version ("1.16");
 script_cvs_date("Date: 2018/07/14  1:59:35");

 script_cve_id("CVE-2005-1248");
 script_bugtraq_id(13565);

 script_name(english:"iTunes < 4.8.0 MPEG-4 Parsing Overflow (Mac OS X)");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote host has an application that is affected by buffer overflow
vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of iTunes which is older than
version 4.8.0. Such versions reportedly fail to perform certain 
validation checks on MPEG4 files, and hence it could be possible 
to trigger a buffer overflow condition. Successful exploitation of 
this issue could lead to a denial of service condition or arbitrary
code execution on the remote system." );
 script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/advisories/8545" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to iTunes 4.8.0" );
 script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2005/05/09");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/05/09");
 script_set_attribute(attribute:"patch_publication_date", value: "2005/05/09");
 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:itunes");
 script_end_attributes();

 script_summary(english:"Check the version of iTunes");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
 script_family(english:"MacOS X Local Security Checks");
 script_dependencies("macosx_iTunes_Overflow.nasl");
 script_require_keys("iTunes/Version");
 exit(0);
}


version = get_kb_item("iTunes/Version");
if ( ! version ) exit(0);
if ( egrep(pattern:"^4\.([0-7]\..*)$", string:version )) security_hole(0); 

Oval

accepted2015-06-22T04:00:28.844-04:00
classvulnerability
contributors
  • nameShane Shaffer
    organizationG2, Inc.
  • nameShane Shaffer
    organizationG2, Inc.
  • nameBernd Eggenmueller
    organizationbaramundi software
definition_extensions
commentApple iTunes is installed
ovaloval:org.mitre.oval:def:12353
descriptionBuffer overflow in Apple iTunes before 4.8 allows remote attackers to execute arbitrary code via a crafted MPEG4 file.
familywindows
idoval:org.mitre.oval:def:17304
statusaccepted
submitted2013-07-30T11:32:03.685-04:00
titleBuffer overflow in Apple iTunes before 4.8 allows remote attackers to execute arbitrary code via a crafted MPEG4 file
version7