Booby-trapped playlist pwns iTunes

Powered by SC Magazine
 

Apple patches buffer overflow hole.

A vulnerability has been discovered in iTunes that could allow attackers to execute remote code on target machines.

The heap buffer overflow vulnerability affects the M3U playlists of iTunes versions 10.6.1 and 10.6.0 and was caused due to a boundary error while playlists file were processed.

Attackers who exploited the hole could target victims by sending boody-trapped playlist files.

Gjoko Krstic, researcher at Mauritus oufit Zero Science reported the hole to Apple in March this year which patched the flaw in 10.6.3 this week.

Krstic has also released proof of concept exploit code for the flaw.

Sophos senior security boffin Sean Richmond advised users to update.

 “…the possibility of remote code execution is always an attractive target - and this has proof of concept code,” he said.

Copyright © SC Magazine, Australia


Booby-trapped playlist pwns iTunes
 
 
 
Top Stories
Beyond ACORN: Cracking the infosec skills nut
[Blog post] Could the Government's cybercrime focus be a catalyst for change?
 
The iTnews Benchmark Awards
Meet the best of the best.
 
Telstra hands over copper, HFC in new $11bn NBN deal
Value of 2011 deal remains intact.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  38%
 
Your insurance company
  4%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  3%
 
A Federal Government agency (ATO, Centrelink etc)
  19%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  6%
TOTAL VOTES: 1869

Vote
Do you support the abolition of the Office of the Information Commissioner?