Operating System:

[Win]

Published:

23 October 2013

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.1515
                    APPLE-SA-2013-10-22-8 iTunes 11.1.2
                              23 October 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           iTunes
Publisher:         Apple
Operating System:  Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Provide Misleading Information  -- Remote with User Interaction
                   Unauthorised Access             -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-5128 CVE-2013-5127 CVE-2013-5126
                   CVE-2013-5125 CVE-2013-2842 CVE-2013-1047
                   CVE-2013-1046 CVE-2013-1045 CVE-2013-1044
                   CVE-2013-1043 CVE-2013-1042 CVE-2013-1041
                   CVE-2013-1040 CVE-2013-1039 CVE-2013-1038
                   CVE-2013-1037 CVE-2013-1024 CVE-2012-5134
                   CVE-2012-2871 CVE-2012-2870 CVE-2012-2825
                   CVE-2012-2807 CVE-2012-0841 CVE-2011-3102

Reference:         ASB-2013.0066
                   ASB-2013.0057
                   ESB-2012.1123
                   ESB-2012.0894

Original Bulletin: 
   http://support.apple.com/kb/HT1222

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2013-10-22-8 iTunes 11.1.2

iTunes 11.1.2 is now available and addresses the following:

iTunes
Available for:  Windows 7, Vista, XP SP2 or later
Impact:  Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description:  An uninitialized memory access issue existed in the
handling of text tracks. This issue was addressed by additional
validation of text tracks.
CVE-ID
CVE-2013-1024 : Richard Kuo and Billy Suguitan of Triemt Corporation

iTunes
Available for:  Windows 7, Vista, XP SP2 or later
Impact:  A man-in-the-middle attack while browsing the iTunes Store
via iTunes may lead to an unexpected application termination or
arbitrary code executionn
Description:  Multiple memory corruption issues existed in WebKit.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2013-1037 : Google Chrome Security Team
CVE-2013-1038 : Google Chrome Security Team
CVE-2013-1039 : own-hero Research working with iDefense VCP
CVE-2013-1040 : Google Chrome Security Team
CVE-2013-1041 : Google Chrome Security Team
CVE-2013-1042 : Google Chrome Security Team
CVE-2013-1043 : Google Chrome Security Team
CVE-2013-1044 : Apple
CVE-2013-1045 : Google Chrome Security Team
CVE-2013-1046 : Google Chrome Security Team
CVE-2013-1047 : miaubiz
CVE-2013-2842 : Cyril Cattiaux
CVE-2013-5125 : Google Chrome Security Team
CVE-2013-5126 : Apple
CVE-2013-5127 : Google Chrome Security Team
CVE-2013-5128 : Apple

libxml
Available for:  Windows 7, Vista, XP SP2 or later
Impact:  Viewing a maliciously crafted web page may lead to an
unexpected application termination or arbitrary code execution
Description:  Multiple memory corruption issues existed in libxml.
These issues were addressed by updating libxml to version 2.9.0.
CVE-ID
CVE-2011-3102 : Juri Aedla
CVE-2012-0841
CVE-2012-2807 : Juri Aedla
CVE-2012-5134 : Google Chrome Security Team (Juri Aedla)

libxslt
Available for:  Windows 7, Vista, XP SP2 or later
Impact:  Viewing a maliciously crafted web page may lead to an
unexpected application termination or arbitrary code execution
Description:  Multiple memory corruption issues existed in libxslt.
These issues were addressed by updating libxslt to version 1.1.28.
CVE-ID
CVE-2012-2825 : Nicolas Gregoire
CVE-2012-2870 : Nicolas Gregoire
CVE-2012-2871 : Kai Lu of Fortinet's FortiGuard Labs, Nicolas
Gregoire


iTunes 11.1.2 may be obtained from:
http://www.apple.com/itunes/download/

For Windows XP / Vista / Windows 7:
The download file is named: "iTunesSetup.exe"
Its SHA-1 digest is: e3ecbc0b88b683ab14657b3cf96dba60673bd88f

For 64-bit Windows XP / Vista / Windows 7:
The download file is named: "iTunes64Setup.exe"
Its SHA-1 digest is: bb6c77a33f26f41c322455eea25bfd81f59ac5bc

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=0yE/
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=dpej
-----END PGP SIGNATURE-----