Booby-trapped playlist hits iTunes

By Darren Pauli on Jun 15, 2012 7:42 AM
Filed under Software

Apple patches buffer overflow hole.

A vulnerability has been discovered in iTunes that could allow attackers to execute remote code on target machines.

The heap buffer overflow vulnerability affects the M3U playlists of iTunes versions 10.6.1 and 10.6.0 and was caused due to a boundary error while playlists file were processed.

Attackers who exploited the hole could target victims by sending boody-trapped playlist files.

Gjoko Krstic, researcher at Mauritus oufit Zero Science reported the hole to Apple in March this year which patched the flaw in 10.6.3 this week.

Krstic has also released proof of concept exploit code for the flaw.

Sophos senior security boffin Sean Richmond advised users to update.

 “…the possibility of remote code execution is always an attractive target - and this has proof of concept code,” he said.

 
Follow us on Facebook and Twitter
 

Copyright © SC Magazine, Australia

Booby-trapped playlist hits iTunes
 
 
 
 
 
Top Stories
NEC Australia to sell HQ, hints at possible job cuts
Another multimillion-dollar loss for local arm of Japanese giant.
 
Deloitte Private taps Xero partner for its own cloud play
Cloud "pioneer" to push firm's Connect platform.
 
Here's what the Dicker Data mega-merger means in dollars
Distie to report $200 million jump in revenue.
 
Sign up to receive CRN email bulletins
   FOLLOW US...
Polls
Which mobile device couldn't you live without?


Latest Comments
CRN Magazine

Issue: 328 | June 2014

CRN Magazine looks in-depth at the emerging issues and developments for the channel, and provides insight, analysis and strategic information to help resellers better run their businesses.