Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-0170 (GCVE-0-2011-0170)
Vulnerability from cvelistv5 – Published: 2011-03-03 19:00 – Updated: 2024-08-06 21:43- n/a
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:43:15.249Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT4566"
},
{
"name": "APPLE-SA-2011-03-21-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "oval:org.mitre.oval:def:17367",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17367"
},
{
"name": "APPLE-SA-2011-03-02-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT4554"
},
{
"name": "APPLE-SA-2011-03-09-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
},
{
"name": "20110302 Apple CoreGraphics Library Heap Memory Corruption Vulnerability",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE",
"x_transferred"
],
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=897"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT4581"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-03-02T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in ImageIO in CoreGraphics in Apple iTunes before 10.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted International Color Consortium (ICC) profile in a JPEG image."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-18T12:57:01.000Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT4566"
},
{
"name": "APPLE-SA-2011-03-21-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "oval:org.mitre.oval:def:17367",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17367"
},
{
"name": "APPLE-SA-2011-03-02-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT4554"
},
{
"name": "APPLE-SA-2011-03-09-2",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
},
{
"name": "20110302 Apple CoreGraphics Library Heap Memory Corruption Vulnerability",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE"
],
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=897"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT4581"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0170",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in ImageIO in CoreGraphics in Apple iTunes before 10.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted International Color Consortium (ICC) profile in a JPEG image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://support.apple.com/kb/HT4566",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4566"
},
{
"name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "oval:org.mitre.oval:def:17367",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17367"
},
{
"name": "APPLE-SA-2011-03-02-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT4554",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4554"
},
{
"name": "APPLE-SA-2011-03-09-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
},
{
"name": "20110302 Apple CoreGraphics Library Heap Memory Corruption Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=897"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2011-0170",
"datePublished": "2011-03-03T19:00:00.000Z",
"dateReserved": "2010-12-23T00:00:00.000Z",
"dateUpdated": "2024-08-06T21:43:15.249Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTA-2011-AVI-150
Vulnerability from certfr_avis - Published: 2011-03-11 - Updated: 2011-03-11
De multiples vulnérabilités permettant l'exécution de code arbitraire ont été corrigées dans Apple Safari.
Description
De multiples vulnérabilités ont été corrigées dans Apple Safari pour Microsoft Windows et Mac OS X. Celles-ci permettent l'exécution de code arbitraire à distance par l'intermédiaire d'une page Web spécialement conçue.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
La version 5.0.4 de Apple Safari corrige ces vulnérabilités. Cette nouvelle version integre une mise à jour de la libpng en version 1.4.3.
Apple Safari versions antérieures à 5.0.4.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eApple Safari versions ant\u00e9rieures \u00e0 5.0.4.\u003c/p\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Apple Safari pour\nMicrosoft Windows et Mac OS X. Celles-ci permettent l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance par l\u0027interm\u00e9diaire d\u0027une page Web sp\u00e9cialement\ncon\u00e7ue.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n\nLa version 5.0.4 de Apple Safari corrige ces vuln\u00e9rabilit\u00e9s. Cette\nnouvelle version integre une mise \u00e0 jour de la libpng en version 1.4.3.\n",
"cves": [
{
"name": "CVE-2011-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0170"
},
{
"name": "CVE-2011-0153",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0153"
},
{
"name": "CVE-2011-0138",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0138"
},
{
"name": "CVE-2011-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0156"
},
{
"name": "CVE-2011-0192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0192"
},
{
"name": "CVE-2011-0120",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0120"
},
{
"name": "CVE-2011-0115",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0115"
},
{
"name": "CVE-2011-0112",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0112"
},
{
"name": "CVE-2011-0113",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0113"
},
{
"name": "CVE-2011-0140",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0140"
},
{
"name": "CVE-2010-4494",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4494"
},
{
"name": "CVE-2010-2249",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2249"
},
{
"name": "CVE-2011-0148",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0148"
},
{
"name": "CVE-2011-0127",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0127"
},
{
"name": "CVE-2011-0163",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0163"
},
{
"name": "CVE-2011-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0169"
},
{
"name": "CVE-2011-0142",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0142"
},
{
"name": "CVE-2011-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0150"
},
{
"name": "CVE-2011-0122",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0122"
},
{
"name": "CVE-2011-0118",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0118"
},
{
"name": "CVE-2011-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0129"
},
{
"name": "CVE-2011-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0165"
},
{
"name": "CVE-2011-0191",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0191"
},
{
"name": "CVE-2010-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
},
{
"name": "CVE-2011-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0160"
},
{
"name": "CVE-2011-0149",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0149"
},
{
"name": "CVE-2011-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0151"
},
{
"name": "CVE-2011-0126",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0126"
},
{
"name": "CVE-2011-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0155"
},
{
"name": "CVE-2011-0125",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0125"
},
{
"name": "CVE-2011-0119",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0119"
},
{
"name": "CVE-2011-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0161"
},
{
"name": "CVE-2011-0123",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0123"
},
{
"name": "CVE-2011-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0145"
},
{
"name": "CVE-2011-0121",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0121"
},
{
"name": "CVE-2011-0128",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0128"
},
{
"name": "CVE-2011-0141",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0141"
},
{
"name": "CVE-2011-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0152"
},
{
"name": "CVE-2011-0134",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0134"
},
{
"name": "CVE-2011-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0114"
},
{
"name": "CVE-2011-0135",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0135"
},
{
"name": "CVE-2011-0124",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0124"
},
{
"name": "CVE-2011-0132",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0132"
},
{
"name": "CVE-2011-0130",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0130"
},
{
"name": "CVE-2011-0143",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0143"
},
{
"name": "CVE-2011-0111",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0111"
},
{
"name": "CVE-2011-0117",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0117"
},
{
"name": "CVE-2011-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0154"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0146"
},
{
"name": "CVE-2011-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0166"
},
{
"name": "CVE-2010-1824",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1824"
},
{
"name": "CVE-2011-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0144"
},
{
"name": "CVE-2011-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0147"
},
{
"name": "CVE-2011-0131",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0131"
},
{
"name": "CVE-2011-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0167"
},
{
"name": "CVE-2011-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0168"
},
{
"name": "CVE-2011-0136",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0136"
},
{
"name": "CVE-2011-0133",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0133"
},
{
"name": "CVE-2011-0139",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0139"
},
{
"name": "CVE-2011-0137",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0137"
},
{
"name": "CVE-2011-0116",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0116"
}
],
"initial_release_date": "2011-03-11T00:00:00",
"last_revision_date": "2011-03-11T00:00:00",
"links": [],
"reference": "CERTA-2011-AVI-150",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-03-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s permettant l\u0027ex\u00e9cution de code arbitraire\nont \u00e9t\u00e9 corrig\u00e9es dans Apple Safari.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Safari",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4566 du 09 mars 2011",
"url": "http://support.apple.com/kb/HT4566"
}
]
}
CERTA-2011-AVI-134
Vulnerability from certfr_avis - Published: 2011-03-04 - Updated: 2011-03-04
Plusieurs vulnérabilités dans le lecteur multimédia iTunes d'Apple permettent à une personne distante malintentionnée de provoquer un déni de service ou d'exécuter du code arbitraire.
Description
De multiples vulnérabilités dans iTunes ont été corrigées. Un individu malveillant peut exploiter ces vulnérabilités afin de provoquer l'arrêt inoppinée de l'application ou d'exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
iTunes 10.2.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eiTunes 10.2.\u003c/P\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s dans iTunes ont \u00e9t\u00e9 corrig\u00e9es. Un individu\nmalveillant peut exploiter ces vuln\u00e9rabilit\u00e9s afin de provoquer l\u0027arr\u00eat\ninoppin\u00e9e de l\u0027application ou d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0170"
},
{
"name": "CVE-2011-0153",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0153"
},
{
"name": "CVE-2011-0138",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0138"
},
{
"name": "CVE-2011-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0156"
},
{
"name": "CVE-2011-0192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0192"
},
{
"name": "CVE-2011-0120",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0120"
},
{
"name": "CVE-2011-0115",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0115"
},
{
"name": "CVE-2011-0112",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0112"
},
{
"name": "CVE-2011-0113",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0113"
},
{
"name": "CVE-2011-0140",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0140"
},
{
"name": "CVE-2010-4494",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4494"
},
{
"name": "CVE-2010-2249",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2249"
},
{
"name": "CVE-2011-0148",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0148"
},
{
"name": "CVE-2011-0127",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0127"
},
{
"name": "CVE-2011-0142",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0142"
},
{
"name": "CVE-2011-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0150"
},
{
"name": "CVE-2011-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0164"
},
{
"name": "CVE-2011-0122",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0122"
},
{
"name": "CVE-2011-0118",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0118"
},
{
"name": "CVE-2011-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0129"
},
{
"name": "CVE-2011-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0165"
},
{
"name": "CVE-2011-0191",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0191"
},
{
"name": "CVE-2010-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
},
{
"name": "CVE-2011-0149",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0149"
},
{
"name": "CVE-2011-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0151"
},
{
"name": "CVE-2011-0126",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0126"
},
{
"name": "CVE-2011-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0155"
},
{
"name": "CVE-2011-0125",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0125"
},
{
"name": "CVE-2011-0119",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0119"
},
{
"name": "CVE-2011-0123",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0123"
},
{
"name": "CVE-2011-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0145"
},
{
"name": "CVE-2011-0121",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0121"
},
{
"name": "CVE-2011-0128",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0128"
},
{
"name": "CVE-2011-0141",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0141"
},
{
"name": "CVE-2011-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0152"
},
{
"name": "CVE-2011-0134",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0134"
},
{
"name": "CVE-2011-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0114"
},
{
"name": "CVE-2011-0135",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0135"
},
{
"name": "CVE-2011-0124",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0124"
},
{
"name": "CVE-2011-0132",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0132"
},
{
"name": "CVE-2011-0130",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0130"
},
{
"name": "CVE-2011-0143",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0143"
},
{
"name": "CVE-2011-0111",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0111"
},
{
"name": "CVE-2011-0117",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0117"
},
{
"name": "CVE-2011-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0154"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0146"
},
{
"name": "CVE-2010-1824",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1824"
},
{
"name": "CVE-2011-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0144"
},
{
"name": "CVE-2011-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0147"
},
{
"name": "CVE-2011-0131",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0131"
},
{
"name": "CVE-2011-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0168"
},
{
"name": "CVE-2011-0136",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0136"
},
{
"name": "CVE-2011-0133",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0133"
},
{
"name": "CVE-2011-0139",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0139"
},
{
"name": "CVE-2011-0137",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0137"
},
{
"name": "CVE-2011-0116",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0116"
}
],
"initial_release_date": "2011-03-04T00:00:00",
"last_revision_date": "2011-03-04T00:00:00",
"links": [],
"reference": "CERTA-2011-AVI-134",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-03-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans le lecteur multim\u00e9dia iTunes d\u0027Apple\npermettent \u00e0 une personne distante malintentionn\u00e9e de provoquer un d\u00e9ni\nde service ou d\u0027ex\u00e9cuter du code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans iTunes",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4554 du 02 mars 2011",
"url": "http://support.apple.com/kb/HT4554"
}
]
}
CERTA-2011-AVI-162
Vulnerability from certfr_avis - Published: 2011-03-22 - Updated: 2011-03-22
De nombreuses vulnérabilités ont été corrigées dans Mac OS X. Leur exploitation permet, entre autres, l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités ont été corrigées dans différents composants du système d'exploitation Mac OS X, notamment :
- Airport ;
- AppleScript ;
- ATS ;
- CarbonCore ;
- CoreText ;
- File Quarantine ;
- HFS ;
- ImageIO ;
- ImageRaw ;
- Installer ;
- Kernel ;
- Libinfo ;
- Libxml ;
- QuickLook ;
- QuickTime ;
- Terminal.
Cette mise à jour corrige également un grand nombre de vulnérabilités dans des logiciels inclus au système d'exploitation comme Apache, ClamAV, Kerberos, Mailman, PHP, Ruby, Samba, Subversion et X11. Parmi les failles corrigées, certaines permettent l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X 10.5.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.6.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.5.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X 10.6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans diff\u00e9rents composants\ndu syst\u00e8me d\u0027exploitation Mac OS X, notamment :\n\n- Airport ;\n- AppleScript ;\n- ATS ;\n- CarbonCore ;\n- CoreText ;\n- File Quarantine ;\n- HFS ;\n- ImageIO ;\n- ImageRaw ;\n- Installer ;\n- Kernel ;\n- Libinfo ;\n- Libxml ;\n- QuickLook ;\n- QuickTime ;\n- Terminal.\n\nCette mise \u00e0 jour corrige \u00e9galement un grand nombre de vuln\u00e9rabilit\u00e9s\ndans des logiciels inclus au syst\u00e8me d\u0027exploitation comme Apache,\nClamAV, Kerberos, Mailman, PHP, Ruby, Samba, Subversion et X11. Parmi\nles failles corrig\u00e9es, certaines permettent l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0170"
},
{
"name": "CVE-2010-3089",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3089"
},
{
"name": "CVE-2010-3870",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3870"
},
{
"name": "CVE-2011-0187",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0187"
},
{
"name": "CVE-2010-3709",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3709"
},
{
"name": "CVE-2010-4020",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4020"
},
{
"name": "CVE-2011-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0172"
},
{
"name": "CVE-2011-0181",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0181"
},
{
"name": "CVE-2011-0192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0192"
},
{
"name": "CVE-2010-3710",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3710"
},
{
"name": "CVE-2011-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0183"
},
{
"name": "CVE-2010-4494",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4494"
},
{
"name": "CVE-2011-0182",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0182"
},
{
"name": "CVE-2010-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2068"
},
{
"name": "CVE-2010-1452",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1452"
},
{
"name": "CVE-2010-4021",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4021"
},
{
"name": "CVE-2011-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0173"
},
{
"name": "CVE-2010-0405",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0405"
},
{
"name": "CVE-2010-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2950"
},
{
"name": "CVE-2011-0191",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0191"
},
{
"name": "CVE-2011-0186",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0186"
},
{
"name": "CVE-2011-0178",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0178"
},
{
"name": "CVE-2010-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3802"
},
{
"name": "CVE-2010-4409",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4409"
},
{
"name": "CVE-2011-0190",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0190"
},
{
"name": "CVE-2011-1417",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1417"
},
{
"name": "CVE-2010-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3801"
},
{
"name": "CVE-2010-4479",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4479"
},
{
"name": "CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"name": "CVE-2010-3814",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3814"
},
{
"name": "CVE-2010-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3855"
},
{
"name": "CVE-2011-0180",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0180"
},
{
"name": "CVE-2010-1324",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1324"
},
{
"name": "CVE-2011-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0174"
},
{
"name": "CVE-2011-0189",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0189"
},
{
"name": "CVE-2006-7243",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7243"
},
{
"name": "CVE-2010-4261",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4261"
},
{
"name": "CVE-2010-3434",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3434"
},
{
"name": "CVE-2010-4260",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4260"
},
{
"name": "CVE-2010-3315",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3315"
},
{
"name": "CVE-2011-0184",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0184"
},
{
"name": "CVE-2011-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0179"
},
{
"name": "CVE-2010-3069",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3069"
},
{
"name": "CVE-2011-0177",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0177"
},
{
"name": "CVE-2010-1323",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1323"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2010-3436",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3436"
},
{
"name": "CVE-2011-0194",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0194"
},
{
"name": "CVE-2011-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0175"
},
{
"name": "CVE-2010-4150",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4150"
},
{
"name": "CVE-2011-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0193"
},
{
"name": "CVE-2011-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0176"
},
{
"name": "CVE-2010-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4009"
}
],
"initial_release_date": "2011-03-22T00:00:00",
"last_revision_date": "2011-03-22T00:00:00",
"links": [],
"reference": "CERTA-2011-AVI-162",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-03-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Mac OS X. Leur\nexploitation permet, entre autres, l\u0027ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4581 du 21 mars 2011",
"url": "http://support.apple.com/kb/HT4581"
}
]
}
GHSA-P55R-97RJ-VP52
Vulnerability from github – Published: 2022-05-17 01:02 – Updated: 2022-05-17 01:02Heap-based buffer overflow in ImageIO in CoreGraphics in Apple iTunes before 10.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted International Color Consortium (ICC) profile in a JPEG image.
{
"affected": [],
"aliases": [
"CVE-2011-0170"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-03-03T20:00:00Z",
"severity": "HIGH"
},
"details": "Heap-based buffer overflow in ImageIO in CoreGraphics in Apple iTunes before 10.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted International Color Consortium (ICC) profile in a JPEG image.",
"id": "GHSA-p55r-97rj-vp52",
"modified": "2022-05-17T01:02:15Z",
"published": "2022-05-17T01:02:15Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0170"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17367"
},
{
"type": "WEB",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=897"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT4554"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT4566"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT4581"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2011-0170
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-0170",
"description": "Heap-based buffer overflow in ImageIO in CoreGraphics in Apple iTunes before 10.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted International Color Consortium (ICC) profile in a JPEG image.",
"id": "GSD-2011-0170"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-0170"
],
"details": "Heap-based buffer overflow in ImageIO in CoreGraphics in Apple iTunes before 10.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted International Color Consortium (ICC) profile in a JPEG image.",
"id": "GSD-2011-0170",
"modified": "2023-12-13T01:19:04.315798Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0170",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in ImageIO in CoreGraphics in Apple iTunes before 10.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted International Color Consortium (ICC) profile in a JPEG image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://support.apple.com/kb/HT4566",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4566"
},
{
"name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "oval:org.mitre.oval:def:17367",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17367"
},
{
"name": "APPLE-SA-2011-03-02-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT4554",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4554"
},
{
"name": "APPLE-SA-2011-03-09-2",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
},
{
"name": "20110302 Apple CoreGraphics Library Heap Memory Corruption Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=897"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:8.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:10.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:8.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:9.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:10.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:6.0.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:8.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:9.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "10.1.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0170"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Heap-based buffer overflow in ImageIO in CoreGraphics in Apple iTunes before 10.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted International Color Consortium (ICC) profile in a JPEG image."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20110302 Apple CoreGraphics Library Heap Memory Corruption Vulnerability",
"refsource": "IDEFENSE",
"tags": [],
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=897"
},
{
"name": "APPLE-SA-2011-03-02-1",
"refsource": "APPLE",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT4554",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://support.apple.com/kb/HT4554"
},
{
"name": "APPLE-SA-2011-03-09-2",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
},
{
"name": "http://support.apple.com/kb/HT4566",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT4566"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT4581"
},
{
"name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "oval:org.mitre.oval:def:17367",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17367"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2017-09-19T01:31Z",
"publishedDate": "2011-03-03T20:00Z"
}
}
}
FKIE_CVE-2011-0170
Vulnerability from fkie_nvd - Published: 2011-03-03 20:00 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E40F7857-8F3F-4707-B3AA-A12C0731BB83",
"versionEndIncluding": "10.1.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5CBD58D1-C40D-4F6D-816F-A3842897EB05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C910CA4-5EA5-4507-BDE9-3E6C1434B666",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0415D4B8-0281-4ED5-B3A1-A97BDD0F8D36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B4195D-1550-42D1-B562-0E438F7ACC2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C4B6A66A-AC5F-48E0-ABCE-68828207B106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1206A192-A22C-4C55-A323-1D28D89BED21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "071BFB1F-402B-4D8C-8155-671792AEDB81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52E156DE-12B4-4E7A-B8C4-C2FC0AC2B2C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DCBA60E9-C5B5-4B4C-9FA3-7FE0F3F6871C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93748DFC-6003-4BED-87F9-98713F6897EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB9D7E1-B715-4A93-9CDB-99A89C7D85B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2A8873F1-4792-41A1-83B5-B85C9F4A7D56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB84AFE4-2694-475A-80D3-4D50C524EE18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BB20AA2E-5DF0-420C-A1FE-BB6EBA9649FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B48FDD0A-6DE5-44DD-B144-32B91DB26C7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8343D87F-FA37-4225-B27D-BCCDD2433C31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B591AE1E-02DB-462A-B71F-48947525D232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "34B5892B-0377-4D81-9E0E-94B8D8CE72C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2276BED4-82F0-4F62-AA6F-7E1667F28E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "45D47548-1C4D-4368-99D1-929905DD6B3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "28AE8D2D-63CA-4091-9D59-CE919EB1FD75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EC9E22D2-551A-4CDF-B9F0-C45A3A2B7695",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:6.0.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "52A433A5-3EFF-405D-8285-97EC88857968",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D62A1C5D-C25E-4E56-8FD0-F90C8E39C7F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "582D1FE8-C4E8-4385-B4EB-34320F019E43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AF61CE34-5130-4B1A-B7A2-B28C1A18B9BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEE6DEC-9B26-47F4-A2CF-CA49981C8864",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2223B8E2-346A-4C37-9F6C-879F9CA64C06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "93E5227C-0621-43EE-A0F2-4B4545D71852",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB69B123-7A09-4855-9846-E8ACACB3C6F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C0CC53F2-3827-4CA3-8726-C481B57B4AB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1AFF8F-BBCA-4C93-A401-F8B478327BFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0BA3571F-9221-45CD-9798-CC72CA428D6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "129ABCA4-FBF6-41B8-BF6B-65467D56D297",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "017E5A35-D778-46FD-A536-E57A13162675",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6122C685-4F02-476F-9A41-9C62D3D92651",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "17D37426-00A0-40E5-A27A-CF31D8CBAEEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3E11CADC-AFCC-4A98-9271-C35BC9752B40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "11F1530E-9E63-4A39-9056-3A946A34B650",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3856A348-A0D6-4A0A-A8C9-D369CC863A97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "29E92D8D-68AB-4FC4-A37A-D6D48829B58D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "670656BF-2BE2-41ED-854A-466DC4068FBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE7F79F-54F5-4315-98BD-414CA2D1C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DBBF2E9F-0F37-4DDA-9704-B31D94745257",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BBA5AB05-ADF6-4B5D-A4FD-9C149EC4577F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1143A4DE-F75B-4396-9D01-CE14EF8FCB39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BDF87AB4-B3F3-4774-8CE3-A2B46C3D8DC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A02D076B-5900-401D-9B47-5136B9CEAA15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7E479501-8832-41B0-A63C-360AE5A1B420",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:8.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F8961EDA-B567-4D92-8DBC-F887712F3BD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A60A3349-DE6E-4381-81C0-E682B791ED61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:8.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6EF2759C-6F94-4769-8EB2-16947C05CBB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B0F53FF4-8A15-475C-9FF6-54073A3F1B08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:8.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "80AFD7E5-A66F-4E43-BC34-EB6BF59186D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E41B2E2A-CE22-49FD-9558-0E6C87F53425",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A1950796-DA96-4443-85F4-91FE38A26612",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5EBED9A-DCF4-47FE-9A6D-4573594AA645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:9.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3F7EA3F3-576C-4661-B35F-EC34CE363125",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C3A6055-2626-4A6E-9596-9974E7437FB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:9.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "00AF4F28-A71C-4CB3-8F5F-C15500332954",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B5817849-ADD0-4905-87D5-4D61DB635747",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:10.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "96E90253-3F7D-4361-819B-5D49657F4472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "84336EBA-5EC0-4C49-B1B9-9DAB23D5C3C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:itunes:10.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4CDE68E5-744B-4E18-BB74-83D7185E6A57",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D56B932B-9593-44E2-B610-E4EB2143EB21",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"matchCriteriaId": "C162FFF0-1E8F-4DCF-A08F-6C6E324ED878",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "0A0D2704-C058-420B-B368-372D1129E914",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"matchCriteriaId": "9B339C33-8896-4896-88FF-88E74FDBC543",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"matchCriteriaId": "CE477A73-4EE4-41E9-8694-5A3D5DC88656",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in ImageIO in CoreGraphics in Apple iTunes before 10.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted International Color Consortium (ICC) profile in a JPEG image."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en memoria din\u00e1mica en ImageIO en CoreGraphics en iTunes de Apple antes de v10.2 en Windows permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (bloqueo de aplicaci\u00f3n) a trav\u00e9s de un perfil manipulado International Color Consortium (ICC) en una imagen JPEG."
}
],
"id": "CVE-2011-0170",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2011-03-03T20:00:02.597",
"references": [
{
"source": "product-security@apple.com",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=897"
},
{
"source": "product-security@apple.com",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
},
{
"source": "product-security@apple.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html"
},
{
"source": "product-security@apple.com",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "http://support.apple.com/kb/HT4554"
},
{
"source": "product-security@apple.com",
"url": "http://support.apple.com/kb/HT4566"
},
{
"source": "product-security@apple.com",
"url": "http://support.apple.com/kb/HT4581"
},
{
"source": "product-security@apple.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17367"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=897"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://support.apple.com/kb/HT4554"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT4566"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT4581"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17367"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.