First published: Wed Oct 12 2011(Updated: )
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
iTunes | =6.0.2 | |
iTunes | =4.7.2 | |
iTunes | =7.0.2 | |
iTunes | =7.4.1 | |
iTunes | =7.3.2 | |
iTunes | =10.0.1 | |
iTunes | =7.4.0 | |
iTunes | =6.0.0 | |
iTunes | =5.0.0 | |
iTunes | =10.0 | |
iTunes | =7.4.2 | |
iTunes | =10.1.1 | |
iTunes | =9.2.1 | |
iTunes | =10.1 | |
iTunes | =7.1.1 | |
iTunes | =4.0.1 | |
iTunes | =10.3.1 | |
iTunes | =4.0.0 | |
iTunes | =10.4 | |
iTunes | =8.0.0 | |
iTunes | =7.6.1 | |
iTunes | =6.0.5 | |
iTunes | =9.2 | |
iTunes | =9.0.0 | |
iTunes | =4.5.0 | |
iTunes | =4.7.0 | |
iTunes | =7.7.0 | |
iTunes | =9.1 | |
iTunes | =4.9.0 | |
iTunes | =9.0.3 | |
iTunes | <=10.4.1 | |
iTunes | =7.0.1 | |
iTunes | =7.3.0 | |
iTunes | =6.0.1 | |
iTunes | =9.0.1 | |
iTunes | =6.0.4 | |
iTunes | =7.2.0 | |
iTunes | =10.1.2 | |
iTunes | =7.6.0 | |
iTunes | =5.0.1 | |
iTunes | =6.0.3 | |
iTunes | =4.6.0 | |
iTunes | =4.1.0 | |
iTunes | =9.1.1 | |
iTunes | =7.3.1 | |
iTunes | =4.2.0 | |
iTunes | =10.2 | |
iTunes | =9.0.2 | |
iTunes | =7.7.1 | |
iTunes | =4.8.0 | |
iTunes | =7.4.3 | |
iTunes | =7.6.2 | |
iTunes | =7.5.0 | |
iTunes | =7.1.0 | |
WebKit | ||
iTunes | =7.0.0 | |
iTunes | =4.7.1 | |
iTunes | =8.0.1 | |
iTunes | =10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2820 is classified as a high severity vulnerability due to its potential for remote code execution and denial of service.
To fix CVE-2011-2820, upgrade to a patched version of Apple iTunes that addresses this vulnerability.
CVE-2011-2820 affects multiple versions of Apple iTunes for Windows prior to 10.5.
CVE-2011-2820 can be exploited by man-in-the-middle attackers to execute arbitrary code or cause a denial of service.
There are no known workarounds for CVE-2011-2820, so the best mitigation is to upgrade to a secure version of the software.