Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Application (Multimedia)  >   Apple iTunes Vendors:   Apple
Apple iTunes Tutorials Non-Secure Connection Lets Remote Users Conduct Man-in-the-Middle Attacks
SecurityTracker Alert ID:  1029671
SecurityTracker URL:
CVE Reference:   CVE-2014-1242   (Links to External Site)
Date:  Jan 23 2014
Impact:   Disclosure of system information, Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 11.1.4
Description:   A vulnerability was reported in Apple iTunes. A remote user can conduct man-in-the-middle attacks.

The iTunes Tutorials window uses a non-secure HTTP connection to retrieve content. A remote user can conduct a man-in-the-middle attack to inject arbitrary contents into the target user's iTunes Tutorials window.

Impact:   A remote user can conduct man-in-the-middle attacks.
Solution:   The vendor has issued a fix (11.1.4).

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error, Authentication error
Underlying OS:   UNIX (OS X), Windows (7), Windows (8), Windows (Vista), Windows (XP)

Message History:   None.

 Source Message Contents

Date:  Thu, 23 Jan 2014 04:15:35 +0000
Subject:  Apple iTunes

Excerpt from:

APPLE-SA-2014-01-22-1 iTunes 11.1.4

Available for:  Mac OS X v10.6.8 or later, Windows 8, Windows 7,
Vista, XP SP2 or later
Impact:  An attacker with a privileged network position may control
the contents of the iTunes Tutorials window
Description:  The contents of the iTunes Tutorials window are
retrieved from the network using an unprotected HTTP connection. An
attacker with a privileged network position may inject arbitrary
contents. This issue was addressed by using an encrypted HTTPS
connection to retrieve tutorials.
CVE-2014-1242 : Apple


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2015, LLC