This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple iTunes.
The specific flaw exists in the URL handlers associated with iTunes.
When processing URLs via the protocol handlers ITMS, ITMSS, DAAP, PCAST, and ITPC an exploitable stack overflow occurs.
The specific flaw exists in the URL handlers associated with iTunes.
When processing URLs via the protocol handlers ITMS, ITMSS, DAAP, PCAST, and ITPC an exploitable stack overflow occurs.