It turns out that the 
bug in Apple iTunes under Windows , closed in version 9.1, turned out to be much more serious than expected. According 
to H.D. Moore (author of the well-known Metasploit program), it is not exclusive to iTunes, but is present in about 40 other Windows programs, including the Windows shell, and Microsoft cannot close it with a single patch. For each application will have to release a separate update.
Application names are not reported, so as not to give a mechanism to create an exploit. However, H. Moore noticed that this bug is similar to the recently discovered by Belarusians 
vulnerability with Windows shortcuts , which was closed by 
an extraordinary Microsoft 
patch of August 2. HH Moore discovered a new vulnerability just when he was studying a bug with labels. Here, an attacker can load the victim .dll onto the victim’s machine after the user opens the “safe” file from the network drive. The attack is possible through a browser or other program, for example, office applications with embedded content.
The security recommendations are the same as last time: blocking outbound SMB (TCP ports 139 and 445) and disabling the WebDAV client.