A vulnerability has been discovered in iTunes that could allow attackers to execute remote code on target machines.
The heap buffer overflow vulnerability affects the M3U playlists of iTunes versions 10.6.1 and 10.6.0 and was caused due to a boundary error while playlists file were processed.
Attackers who exploited the hole could target victims by sending boody-trapped playlist files.
Gjoko Krstic, researcher at Mauritus oufit Zero Science reported the hole to Apple in March this year which patched the flaw in 10.6.3 this week.
Krstic has also released proof of concept exploit code for the flaw.
Sophos senior security boffin Sean Richmond advised users to update.
“…the possibility of remote code execution is always an attractive target - and this has proof of concept code,” he said.
Copyright © SC Magazine, Australia
Issue: 324 | February 2014
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.