ID CVE-2010-0532
Summary Race condition in the installation package in Apple iTunes before 9.1 on Windows allows local users to gain privileges by replacing an unspecified file with a Trojan horse. Per: http://lists.apple.com/archives/security-announce/2010//Mar/msg00003.html 'This issue does not affect Mac OS X systems.'
References
Vulnerable Configurations
  • cpe:2.3:a:apple:itunes:9.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:9.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:9.0.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:9.0.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:9.0.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:9.0.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:9.0.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:9.0.2:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:4.0.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:4.0.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:4.0.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:4.0.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:4.1.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:4.1.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:4.2.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:4.2.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:4.5.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:4.5.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:4.6.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:4.6.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:4.7.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:4.7.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:4.7.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:4.7.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:4.8.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:4.8.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:4.9.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:4.9.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:5.0.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:5.0.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:5.0.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:5.0.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:6.0.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:6.0.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:6.0.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:6.0.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:6.0.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:6.0.2:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:6.0.3:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:6.0.3:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:6.0.4:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:6.0.4:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:6.0.5:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:6.0.5:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.0.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.0.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.0.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.0.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.0.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.0.2:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.1.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.1.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.1.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.1.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.2.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.2.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.3.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.3.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.3.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.3.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.3.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.3.2:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.4.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.4.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.4.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.4.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.4.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.4.2:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.5.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.5.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.6.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.6.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.6.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.6.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.6.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.6.2:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.7.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.7.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:7.7.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:7.7.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:8.0.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:8.0.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:itunes:8.0.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:itunes:8.0.1:-:windows:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*
CVSS
Base: 6.9 (as of 19-09-2017 - 01:30)
Impact:
Exploitability:
CWE CWE-362
CAPEC
  • Leveraging Race Conditions
    The adversary targets a race condition occurring when multiple processes access and manipulate the same resource concurrently, and the outcome of the execution depends on the particular order in which the access takes place. The adversary can leverage a race condition by "running the race", modifying the resource and modifying the normal execution flow. For instance, a race condition can occur while accessing a file: the adversary can trick the system by replacing the original file with his version and cause the system to read the malicious file.
  • Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
    This attack targets a race condition occurring between the time of check (state) for a resource and the time of use of a resource. A typical example is file access. The adversary can leverage a file access race condition by "running the race", meaning that they would modify the resource between the first time the target program accesses the file and the time the target program uses the file. During that period of time, the adversary could replace or modify the file, causing the application to behave unexpectedly.
Access
VectorComplexityAuthentication
LOCAL MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:M/Au:N/C:C/I:C/A:C
oval via4
accepted 2015-06-22T04:00:48.441-04:00
class vulnerability
contributors
  • name J. Daniel Brown
    organization DTCC
  • name Scott Quint
    organization Quintechssential
  • name Pooja Shetty
    organization SecPod Technologies
  • name Maria Kedovskaya
    organization ALTX-SOFT
  • name Shane Shaffer
    organization G2, Inc.
  • name Bernd Eggenmueller
    organization baramundi software
definition_extensions
comment Apple iTunes is installed
oval oval:org.mitre.oval:def:12353
description Race condition in the installation package in Apple iTunes before 9.1 on Windows allows local users to gain privileges by replacing an unspecified file with a Trojan horse.
family windows
id oval:org.mitre.oval:def:7110
status accepted
submitted 2010-04-09T10:30:00.000-05:00
title Apple iTunes Install or Update Privilege Escalation Vulnerability
version 14
refmap via4
apple APPLE-SA-2010-03-30-2
confirm http://support.apple.com/kb/HT4105
secunia 39135
Last major update 19-09-2017 - 01:30
Published 31-03-2010 - 18:30
Last modified 19-09-2017 - 01:30
Back to Top