9.3
CVSSv2

CVE-2012-0677

Published: 12/06/2012 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 940
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in Apple iTunes prior to 10.6.3 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a crafted .m3u playlist.

Vulnerable Product Search on Vulmon Subscribe to Product

apple itunes 10.3

apple itunes 10.2

apple itunes 10.4

apple itunes 10.4.0.80

apple itunes 10.1

apple itunes 10.1.1

apple itunes 10.1.1.4

apple itunes 10.5.1

apple itunes 10.5.1.42

apple itunes 10.3.1

apple itunes 10.4.1.10

apple itunes 10.5.2

apple itunes 10.0

apple itunes 10.0.1

apple itunes 10.2.2.12

apple itunes 10.5

apple itunes 10.5.3

apple itunes 10.4.1

apple itunes 10.6

apple itunes 10.1.2

apple itunes

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking inc ...
#!/usr/bin/perl # # # Apple iTunes 10617 M3U Playlist File Walking Heap Buffer Overflow # # # Vendor: Apple Inc # Product web page: wwwapplecom # Affected version: 10617 and 106040 # # Summary: iTunes is a free application for your Mac or PC It lets you # organize and play digital music and video on your computer It can # autom ...
Apple iTunes version 10617 M3U playlist file walking heap buffer overflow proof of concept exploit This also affects 106040 ...
This Metasploit module exploits a stack buffer overflow in iTunes 104080 to 10617 When opening an extended m3u file containing an "#EXTINF:" tag description, iTunes will copy the content after "#EXTINF:" without appropriate checking from a heap buffer to a stack buffer and write beyond the stack buffers boundary This allows arbitrary code ...