search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Apple iTunes fails to properly parse AAC files

Vulnerability Note VU#907836

Original Release Date: 2006-06-30 | Last Revised: 2006-06-30

Overview

Apple iTunes does not properly parse AAC files. This vulnerability may allow a remote attacker to execute arbitrary code.

Description

Apple iTunes

Apple iTunes is a digital media player available for the Microsoft Windows and Mac OS X operating systems.

Advanced Audio Coding (AAC) file format

According to Apple,

Advanced Audio Coding (AAC) is at the core of the MPEG-4, 3GPP and 3GPP2 specifications and is the audio codec of choice for Internet, wireless and digital broadcast arenas. AAC provides audio encoding that compresses much more efficiently than older formats, such as MP3, yet delivers quality rivaling that of uncompressed CD audio.
The AAC format is used in files with .M4P, .M4A, and .M4B extensions.

The Problem

Apple iTunes contains an integer overflow in the code used to parse AAC files. If a remote unauthenticated attacker persuades a user to access a specially crafted AAC file with iTunes, that attacker may be able to trigger the overflow.

Note that this vulnerability affects iTunes for Mac OS X and Microsoft Windows. For more information refer to the Security Content for iTunes 6.0.5.

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code.

Solution

Upgrade iTunes
Apple has release iTunes 6.0.5 to address this issue.

Vendor Information

907836
 

Apple Computer, Inc. Affected

Updated:  June 30, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Refer to http://docs.info.apple.com/article.html?artnum=303952.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Apple Product Security for reporting this vulnerability. Apple, in turn, credits ATmaCA working with TippingPoint and the Zero Day Initiative for reporting this issue.

This document was written by Chad R Dougherty and Jeff Gennari.

Other Information

CVE IDs: CVE-2006-1467
Severity Metric: 11.73
Date Public: 2006-06-29
Date First Published: 2006-06-30
Date Last Updated: 2006-06-30 18:27 UTC
Document Revision: 11

Sponsored by CISA.