CVE-2024-27793

The issue was addressed with improved checks. This issue is fixed in iTunes 12.13.2 for Windows. Parsing a file may lead to an unexpected app termination or arbitrary code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*

History

26 Mar 2025, 14:15

Type Values Removed Values Added
CWE CWE-94

09 Dec 2024, 19:28

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.3
v2 : unknown
v3 : 7.8
First Time Apple
Apple itunes
CPE cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*
CWE NVD-CWE-noinfo
References () http://seclists.org/fulldisclosure/2024/May/8 - () http://seclists.org/fulldisclosure/2024/May/8 - Mailing List
References () https://support.apple.com/en-us/HT214099 - () https://support.apple.com/en-us/HT214099 - Vendor Advisory

Information

Published : 2024-05-14 15:13

Updated : 2025-03-26 14:15


NVD link : CVE-2024-27793

Mitre link : CVE-2024-27793

CVE.ORG link : CVE-2024-27793


JSON object : View

Products Affected

apple

  • itunes
CWE
NVD-CWE-noinfo CWE-94

Improper Control of Generation of Code ('Code Injection')