{"vuid":"VU#377368","idnumber":"377368","name":"Apple iTunes fails to properly handle overly long URLs in playlists","keywords":["Apple","iTunes","buffer overflow","playlists","m3u","pls"],"overview":"A buffer overflow vulnerability in iTunes could allow a remote attacker to execute arbitrary code.","clean_desc":"Apple iTunes is a digital media player available for the Microsoft Windows and Mac OS X operating systems. It supports a variety of playlist formats including .m3u and .pls. A playlist allows a user to organize the order in which media files are played. In addition to media files, URLs to digital streams can be included in a playlist. There is a buffer overflow vulnerability in the way iTunes parses URL entries in .m3u and .pls playlist files. If a remote attacker creates a specially crafted playlist containing an overly long URL, a buffer overflow will occur and could lead to arbitrary code execution.","impact":"By convincing a user to load a specially crafted .m3u or .pls playlist file into iTunes, an attacker could execute arbitrary code with the privileges of the user.","resolution":"Install Update Apple has addressed this issue in iTunes version 4.7.1. For further details, please refer to the iTunes 4.7.1 section in the Apple Security Advisory.","workarounds":"","sysaffected":"","thanks":"iDEFENSE credits Sean de Regge \nfor reporting this vulnerability","author":"This document was written by Damon Morda.","public":["http://docs.info.apple.com/article.html?artnum=61798","http://idefense.com/application/poi/display?id=180&type=vulnerabilities&flashstatus=true","http://secunia.com/advisories/13804/"],"cveids":["CVE-2005-0043"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-01-12T15:59:18Z","publicdate":"2005-01-11T00:00:00Z","datefirstpublished":"2005-01-14T16:21:55Z","dateupdated":"2005-01-14T18:26:27Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"9","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"30.375","cam_scorecurrentwidelyknown":"36.703125","cam_scorecurrentwidelyknownexploited":"62.015625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":30.375,"vulnote":null}