ID

VAR-202002-1180


CVE

CVE-2020-3861


TITLE

iTunes for Windows Vulnerability to gain access to protected parts of the file system

Trust: 0.8

sources: JVNDB: JVNDB-2020-002291

DESCRIPTION

The issue was addressed with improved permissions logic. This issue is fixed in iTunes for Windows 12.10.4. A user may gain access to protected parts of the file system. Apple iTunes for Windows is a media player application program based on Windows platform of Apple (Apple). WebKit is one of the web browser engine components. A security vulnerability exists in the WebKit component of Apple iTunes versions prior to 12.10.4 on Windows platforms. CVE-2020-3861: Andrea Pierini (@decoder_it), Christian Danieli (@padovah4ck) Installation note: iTunes for Windows 12.10.4 may be obtained from: https://www.apple.com/itunes/download/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIyBAEBCAAdFiEEM5FaaFRjww9EJgvRBz4uGe3y0M0FAl4whoIACgkQBz4uGe3y 0M3k2g/45YzA61HKOP/ut8SmbuPtnvZP4JQuoKH6hDGPSZkB/QTiFwpfZkKsF1Yo xasFGiJzbKcCCZseAj++KwzarMnE9NdIr/Im5RSoL0welYOAudyXMy+3hnU+dFgQ W/wi+mjw8V1pPtqRhr+pWQWB2VPrpYvTT0FvPlp8C/EdRmt2e8KjJwJvVDt3oeo+ 0HsRV8KLf/QnJwdc8ga8ELpnTx3FDlgDDmotNLPXiNW/8FG1EZCeVT0cH5NDGMrd RkKHK3mTk8sSfMZ6MKVOzY8hBTyPgK+wmSMKwKqsbhEVAWfy2mlZoLZ4lOUXa3z1 22j7sy7LpjiSQCEZV+s0td1FojwQU9Q/d1HPd8b0JUX4L5BwcLcEka76nW6Uz1Dq QVJaWWoMQPj9JHar9HiuOGtP7v15NQg6GzBRDt/z4m8k1Mx5FJI2KfeG68u1aogP 5EEl+VaH71d2/+NwqRzXLozuYJ8xZhiMWo4bI9RYJgACfuHHM1S2DNyp6FBYuQXH t4ZEbApU4l1n2SO3tBttO240mTd2dGqqRqLENX8Q7yoS0nLSXdras4QCBarg75x5 +2n7lk8Z0AAI+VaOYdXiNDc1SQ3sDK/K+sFAlOg7YkT3jSzCWALv35SGoirFE0Ey VXGEPoyPq5aUXY+3TpVtdx21BnNNOWP9uI/yGd0qt0WtNyzdcA==YKVn -----END PGP SIGNATURE-----

Trust: 1.8

sources: NVD: CVE-2020-3861 // JVNDB: JVNDB-2020-002291 // VULHUB: VHN-181986 // PACKETSTORM: 156127

AFFECTED PRODUCTS

vendor:applemodel:itunesscope:ltversion:12.10.4

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:for windows 12.10.4

Trust: 0.8

sources: JVNDB: JVNDB-2020-002291 // NVD: CVE-2020-3861

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-3861
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-002291
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202001-1413
value: HIGH

Trust: 0.6

VULHUB: VHN-181986
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-3861
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-002291
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-181986
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-3861
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 5.2
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-002291
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-181986 // JVNDB: JVNDB-2020-002291 // CNNVD: CNNVD-202001-1413 // NVD: CVE-2020-3861

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-862

Trust: 0.9

sources: VULHUB: VHN-181986 // JVNDB: JVNDB-2020-002291 // NVD: CVE-2020-3861

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202001-1413

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202001-1413

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-002291

PATCH

title:HT210923url:https://support.apple.com/en-us/HT210923

Trust: 0.8

title:HT210923url:https://support.apple.com/ja-jp/HT210923

Trust: 0.8

title:Apple iTunes for Windows WebKit Fixes for component security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=111180

Trust: 0.6

sources: JVNDB: JVNDB-2020-002291 // CNNVD: CNNVD-202001-1413

EXTERNAL IDS

db:NVDid:CVE-2020-3861

Trust: 2.6

db:PACKETSTORMid:156127

Trust: 0.8

db:JVNid:JVNVU95678717

Trust: 0.8

db:JVNDBid:JVNDB-2020-002291

Trust: 0.8

db:CNNVDid:CNNVD-202001-1413

Trust: 0.7

db:AUSCERTid:ESB-2020.0348

Trust: 0.6

db:VULHUBid:VHN-181986

Trust: 0.1

sources: VULHUB: VHN-181986 // JVNDB: JVNDB-2020-002291 // PACKETSTORM: 156127 // CNNVD: CNNVD-202001-1413 // NVD: CVE-2020-3861

REFERENCES

url:https://support.apple.com/ht210923

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-3861

Trust: 1.5

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3861

Trust: 0.8

url:https://jvn.jp/vu/jvnvu95678717/

Trust: 0.8

url:https://support.apple.com/en-au/ht210793

Trust: 0.6

url:https://support.apple.com/en-us/ht210923

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0348/

Trust: 0.6

url:https://packetstormsecurity.com/files/156127/apple-security-advisory-2020-1-28-6.html

Trust: 0.6

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://www.apple.com/itunes/download/

Trust: 0.1

sources: VULHUB: VHN-181986 // JVNDB: JVNDB-2020-002291 // PACKETSTORM: 156127 // CNNVD: CNNVD-202001-1413 // NVD: CVE-2020-3861

CREDITS

Christian Danieli (@padovah4ck),Apple,Andrea Pierini (@decoder_it)

Trust: 0.6

sources: CNNVD: CNNVD-202001-1413

SOURCES

db:VULHUBid:VHN-181986
db:JVNDBid:JVNDB-2020-002291
db:PACKETSTORMid:156127
db:CNNVDid:CNNVD-202001-1413
db:NVDid:CVE-2020-3861

LAST UPDATE DATE

2024-11-23T21:10:07.305000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-181986date:2021-07-21T00:00:00
db:JVNDBid:JVNDB-2020-002291date:2020-03-11T00:00:00
db:CNNVDid:CNNVD-202001-1413date:2021-10-29T00:00:00
db:NVDid:CVE-2020-3861date:2024-11-21T05:31:51.327

SOURCES RELEASE DATE

db:VULHUBid:VHN-181986date:2020-02-27T00:00:00
db:JVNDBid:JVNDB-2020-002291date:2020-03-11T00:00:00
db:PACKETSTORMid:156127date:2020-01-29T17:15:31
db:CNNVDid:CNNVD-202001-1413date:2020-01-30T00:00:00
db:NVDid:CVE-2020-3861date:2020-02-27T21:15:17.833