Vulnerability Details : CVE-2011-3244
WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1.
Vulnerability category: OverflowMemory CorruptionExecute codeDenial of service
Threat overview for CVE-2011-3244
Top countries where our scanners detected CVE-2011-3244
Top open port discovered on systems with this issue
3689
IPs affected by CVE-2011-3244 2
Find out if you* are
affected by CVE-2011-3244!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-3244
Probability of exploitation activity in the next 30 days: 0.42%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 71 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-3244
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
NIST |
CWE ids for CVE-2011-3244
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-3244
-
http://support.apple.com/kb/HT4981
About the security content of iTunes 10.5 - Apple SupportVendor Advisory
-
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html
Apple - Lists.apple.comPatch;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17355
Repository / Oval Repository
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/70518
Apple iTunes WebKit memory code execution CVE-2011-3244 Vulnerability Report
-
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
Apple - Lists.apple.com
-
http://support.apple.com/kb/HT4999
About the security content of iOS 5 Software Update - Apple Support
-
http://www.securityfocus.com/bid/50066
WebKit Multiple Unspecifeid Remote Code Execution Vulnerabilities
Products affected by CVE-2011-3244
- cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:9.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:9.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:9.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:9.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:10.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:10.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:10.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:10.4:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:10.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:10.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:10.3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:10.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*