Vulnerability Note VU#907836

Apple iTunes fails to properly parse AAC files

Original Release date: 30 Jun 2006 | Last revised: 30 Jun 2006


Apple iTunes does not properly parse AAC files. This vulnerability may allow a remote attacker to execute arbitrary code.


Apple iTunes

Apple iTunes is a digital media player available for the Microsoft Windows and Mac OS X operating systems.

Advanced Audio Coding (AAC) file format

According to Apple,

    Advanced Audio Coding (AAC) is at the core of the MPEG-4, 3GPP and 3GPP2 specifications and is the audio codec of choice for Internet, wireless and digital broadcast arenas. AAC provides audio encoding that compresses much more efficiently than older formats, such as MP3, yet delivers quality rivaling that of uncompressed CD audio.
The AAC format is used in files with .M4P, .M4A, and .M4B extensions.

The Problem

Apple iTunes contains an integer overflow in the code used to parse AAC files. If a remote unauthenticated attacker persuades a user to access a specially crafted AAC file with iTunes, that attacker may be able to trigger the overflow.

Note that this vulnerability affects iTunes for Mac OS X and Microsoft Windows. For more information refer to the Security Content for iTunes 6.0.5.


A remote, unauthenticated attacker may be able to execute arbitrary code.


Upgrade iTunes
Apple has release iTunes 6.0.5 to address this issue.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Apple Computer, Inc.Affected-30 Jun 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Apple Product Security for reporting this vulnerability. Apple, in turn, credits ATmaCA working with TippingPoint and the Zero Day Initiative for reporting this issue.

This document was written by Chad R Dougherty and Jeff Gennari.

Other Information

  • CVE IDs: CVE-2006-1467
  • Date Public: 29 Jun 2006
  • Date First Published: 30 Jun 2006
  • Date Last Updated: 30 Jun 2006
  • Severity Metric: 11.73
  • Document Revision: 10


If you have feedback, comments, or additional information about this vulnerability, please send us email.