ID

VAR-201006-0335


CVE

CVE-2010-1763


TITLE

Apple iTunes of WebKit Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2010-001667

DESCRIPTION

Unspecified vulnerability in WebKit in Apple iTunes before 9.2 on Windows has unknown impact and attack vectors, a different vulnerability than CVE-2010-1387 and CVE-2010-1769. Very little information is known about this issue. We will update this BID as soon as more information becomes available. ---------------------------------------------------------------------- Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management Free webinars http://secunia.com/vulnerability_scanning/corporate/webinars/ ---------------------------------------------------------------------- TITLE: Apple iTunes Multiple Vulnerabilities SECUNIA ADVISORY ID: SA40196 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40196/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40196 RELEASE DATE: 2010-06-25 DISCUSS ADVISORY: http://secunia.com/advisories/40196/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/40196/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=40196 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Apple iTunes. Some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, or compromise a user's system. 1) An error when processing ColorSync profiles embedded in a specially crafted image can be exploited to cause a heap-based buffer overflow and potentially execute arbitrary code. This is related to vulnerability #3 in: SA36096 2) Multiple integer overflows when processing TIFF files can be exploited to cause a heap-based buffer overflow and potentially execute arbitrary code. For more information: SA40181 3) Multiple vulnerabilities in WebKit can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, and potentially compromise a user's system. 5) Two vulnerabilities in WebKit can be exploited by malicious people to compromise a user's system. For more information see vulnerability #14 and 15 in: SA40257 SOLUTION: Update to version 9.2. PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Chris Evans of the Google Security Team and Andrzej Dyjak. 2) The vendor credits Kevin Finisterre, digitalmunition.com. 4) Reported by the vendor. ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT4220 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM)

Trust: 2.25

sources: NVD: CVE-2010-1763 // JVNDB: JVNDB-2010-001667 // BID: 41125 // VULHUB: VHN-44368 // VULMON: CVE-2010-1763 // PACKETSTORM: 91028 // PACKETSTORM: 97846

AFFECTED PRODUCTS

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 1.9

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 1.9

vendor:applemodel:itunesscope:eqversion:9.0

Trust: 1.9

vendor:applemodel:itunesscope:eqversion:9.1

Trust: 1.9

vendor:applemodel:itunesscope:eqversion:9.0.0

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:8.0.0

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.7.1

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:9.0.3

Trust: 1.6

vendor:applemodel:itunesscope:eqversion:7.3.2

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:7.3.1

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:7.0.2

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:8.2

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:8.1

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:8.0

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:7.4

Trust: 1.3

vendor:applemodel:itunesscope:eqversion:8.0.1

Trust: 1.0

vendor:applemodel:itunesscope:lteversion:9.1.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.3.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.2.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.5

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.7

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.2.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.7.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.1.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.1.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.0.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.0.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.5.0

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:8.1.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.4.3

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:7.6.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:9.1.1

Trust: 0.6

vendor:webkitmodel:open source project webkitscope:eqversion:0

Trust: 0.3

vendor:esignalmodel:esignalscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.7.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.7

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.6

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0.2.20

Trust: 0.3

vendor:applemodel:itunesscope:neversion:9.2

Trust: 0.3

sources: BID: 41125 // JVNDB: JVNDB-2010-001667 // CNNVD: CNNVD-201006-313 // NVD: CVE-2010-1763

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-1763
value: HIGH

Trust: 1.0

NVD: CVE-2010-1763
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201006-313
value: CRITICAL

Trust: 0.6

VULHUB: VHN-44368
value: HIGH

Trust: 0.1

VULMON: CVE-2010-1763
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-1763
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-44368
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-44368 // VULMON: CVE-2010-1763 // JVNDB: JVNDB-2010-001667 // CNNVD: CNNVD-201006-313 // NVD: CVE-2010-1763

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2010-1763

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201006-313

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201006-313

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001667

PATCH

title:HT4220url:http://support.apple.com/kb/HT4220

Trust: 0.8

title:HT4220url:http://support.apple.com/kb/HT4220?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2010-001667

EXTERNAL IDS

db:NVDid:CVE-2010-1763

Trust: 2.9

db:SECTRACKid:1024108

Trust: 2.6

db:SECUNIAid:40196

Trust: 2.1

db:VUPENid:ADV-2010-1512

Trust: 2.0

db:SECUNIAid:43068

Trust: 1.3

db:VUPENid:ADV-2011-0212

Trust: 1.2

db:XFid:59507

Trust: 0.8

db:JVNDBid:JVNDB-2010-001667

Trust: 0.8

db:CNNVDid:CNNVD-201006-313

Trust: 0.7

db:APPLEid:APPLE-SA-2010-06-16-1

Trust: 0.6

db:BIDid:41125

Trust: 0.5

db:VULHUBid:VHN-44368

Trust: 0.1

db:VULMONid:CVE-2010-1763

Trust: 0.1

db:PACKETSTORMid:91028

Trust: 0.1

db:PACKETSTORMid:97846

Trust: 0.1

sources: VULHUB: VHN-44368 // VULMON: CVE-2010-1763 // BID: 41125 // JVNDB: JVNDB-2010-001667 // PACKETSTORM: 91028 // PACKETSTORM: 97846 // CNNVD: CNNVD-201006-313 // NVD: CVE-2010-1763

REFERENCES

url:http://securitytracker.com/id?1024108

Trust: 2.6

url:http://secunia.com/advisories/40196

Trust: 2.0

url:http://www.vupen.com/english/advisories/2010/1512

Trust: 2.0

url:http://support.apple.com/kb/ht4220

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2010//jun/msg00002.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html

Trust: 1.3

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7221

Trust: 1.2

url:http://secunia.com/advisories/43068

Trust: 1.2

url:http://www.vupen.com/english/advisories/2011/0212

Trust: 1.2

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/59507

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1763

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/59507

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1763

Trust: 0.8

url:http://www.apple.com/itunes/

Trust: 0.3

url:http://secunia.com/products/corporate/evm/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.securityfocus.com/bid/41125

Trust: 0.1

url:http://secunia.com/advisories/40196/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=40196

Trust: 0.1

url:http://secunia.com/advisories/40196/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/webinars/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=43068

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:http://secunia.com/advisories/43068/#comments

Trust: 0.1

url:http://secunia.com/advisories/43068/

Trust: 0.1

sources: VULHUB: VHN-44368 // VULMON: CVE-2010-1763 // BID: 41125 // JVNDB: JVNDB-2010-001667 // PACKETSTORM: 91028 // PACKETSTORM: 97846 // CNNVD: CNNVD-201006-313 // NVD: CVE-2010-1763

CREDITS

Apple

Trust: 0.3

sources: BID: 41125

SOURCES

db:VULHUBid:VHN-44368
db:VULMONid:CVE-2010-1763
db:BIDid:41125
db:JVNDBid:JVNDB-2010-001667
db:PACKETSTORMid:91028
db:PACKETSTORMid:97846
db:CNNVDid:CNNVD-201006-313
db:NVDid:CVE-2010-1763

LAST UPDATE DATE

2024-11-23T21:25:09.287000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-44368date:2017-09-19T00:00:00
db:VULMONid:CVE-2010-1763date:2017-09-19T00:00:00
db:BIDid:41125date:2010-06-16T00:00:00
db:JVNDBid:JVNDB-2010-001667date:2010-07-13T00:00:00
db:CNNVDid:CNNVD-201006-313date:2010-06-23T00:00:00
db:NVDid:CVE-2010-1763date:2024-11-21T01:15:08.960

SOURCES RELEASE DATE

db:VULHUBid:VHN-44368date:2010-06-18T00:00:00
db:VULMONid:CVE-2010-1763date:2010-06-18T00:00:00
db:BIDid:41125date:2010-06-16T00:00:00
db:JVNDBid:JVNDB-2010-001667date:2010-07-13T00:00:00
db:PACKETSTORMid:91028date:2010-06-25T14:14:55
db:PACKETSTORMid:97846date:2011-01-25T03:59:20
db:CNNVDid:CNNVD-201006-313date:2010-06-23T00:00:00
db:NVDid:CVE-2010-1763date:2010-06-18T16:30:01.423