• Close
  • Back to search

    Apple OS X iTunes 8.1.1 ITMS Overflow

    This modules exploits a stack-based buffer overflow in iTunes itms:// URL parsing. It is accessible from the browser and in Safari, itms urls will be opened in iTunes automatically. Because iTunes is multithreaded, only vfork-based payloads should be used.

    Free Metasploit Download

    Get your copy of the world's leading penetration testing tool

     Download Now

    Module Name

    exploit/multi/browser/itms_overflow

    Authors

    • Will Drewry <redpig [at] dataspill.org>

    References

    Targets

    • OS X

    Platforms

    • osx

    Architectures

    • x86

    Reliability

    Development

    Module Options

    To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

    msf > use exploit/multi/browser/itms_overflow msf exploit(itms_overflow) > show targets ...targets... msf exploit(itms_overflow) > set TARGET <target-id> msf exploit(itms_overflow) > show options ...show and set options... msf exploit(itms_overflow) > exploit

    Related Vulnerabilities