New iTunes flaw warning

By
Follow google news

Music downloaders are being warned about an exploitable flaw in Apple’s iTunes program.

Calling the warning's severity "high," eEye warned last week that a flaw exists in the popular music downloading program that could allow malicious code to compromise it.


"A remotely exploitable flaw exists that allows arbitrary code to be executed in the context of the logged-in user," the security firm warned on its website. The vulnerability exists on all Microsoft operating systems.

Earlier last week, Apple had released an advisory that a malicious user could compromise PCs through iTunes 5 and said the vulnerability had been addressed in later versions of the program.

"Due to the way iTunes 5 for Windows launches its helper application, multiple system paths are searched to determine which program to run," Apple warned on its iTunes site. "This may allow a malicious user on the local system to create an environment where an alternate program will be executed by iTunes. This has already been addressed in the iTunes 6 release for Windows."

www.eeye.com
Learn more   →">Partner Content Beyond Compliance: How Australia's Aged Care Reforms Create an Innovation Imperative

Cyconsol Unlocks Growth Potential for Cyber Vendors in Australia
Cyconsol Unlocks Growth Potential for Cyber Vendors in Australia
AI Goals for 2026: What Every Organisation Should Prioritise
AI Goals for 2026: What Every Organisation Should Prioritise
How digital pharmacy platforms are redefining healthcare in Australia
How digital pharmacy platforms are redefining healthcare in Australia

Most Read Articles

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

AI can unmask online users for just a few dollars each

AI can unmask online users for just a few dollars each

Australia's big end of town is paying ransomware groups

Australia's big end of town is paying ransomware groups

Phishers abuse little-known core Internet infrastructure

Phishers abuse little-known core Internet infrastructure

Log In

  |  Forgot your password?