Apple delivers prodigious patch batch for iPhone with OS update
Fixes 46 flaws, including bug that 'Pwn2Own' hacker used to win $5K in March
Computerworld - Apple yesterday patched 46 security vulnerabilities, half of them in the Safari browser and its WebKit rendering engine, for the iPhone and iPod Touch as it released iPhone OS 3.0.
The company fixed nearly four times the number of flaws Wednesday than when it last patched the iPhone software. In November 2008, Apple issued a security update alongside iPhone 2.2 that plugged 12 holes.
Almost half of the vulnerabilities -- 21 all told -- were tagged with Apple's usual "arbitrary code execution" phrase, lingo that essentially means that the bug is critical and could be used to compromise the device. Unlike other major software makers, such as rival operating system developer Microsoft and database giant Oracle, Apple doesn't rank vulnerabilities using a scoring system.
Not surprisingly, 50% of the patches apply to bugs in Safari, the iPhone and iPod Touch's browser, or WebKit, the open-source browser engine that Apple uses as Safari's foundation. Safari and WebKit have been the focus of most research into iPhone hacks. The first reported iPhone bug, for example, was a Safari flaw found by a trio of researchers, including Charlie Miller, formerly with the National Security Agency, in July 2007.
One of the WebKit vulnerabilities stands out because of the attention it received in March, when a German college student, who gave only his first name, Nils, walked away with a $5,000 cash prize for hacking Safari at the "Pwn2Own" challenge. Nils used a bug in WebKit's handling of SVGList objects to crack Safari.
Nils' WebKit bug was first patched in a massive 67-flaw fix issued in mid-May for Mac OS X; today Apple patched the same vulnerability in the iPhone's operating system.
Apple addressed eight bugs in CoreGraphics, five in the XML library, two in the iPhone's e-mail client, and other flaws in ImageIO, IPSec and Unicode components of the operating system. The update also patches a vulnerability in how the iPhone connects to Microsoft Exchange servers, which could be exploited to steal data or gain access to the iPhone's Exchange account.
iPhone 3.0, which contains the 46 patches, can be downloaded by connecting the iPhone or iPod Touch to its sync PC or Mac, running iTunes, clicking on the device in the listing on the left and then clicking the "Check for Update" button.
Apple iPhone 3.0
- Opinion: The 5 best things about iPhone OS 3.0
- Apple delivers iPhone OS 3.0 update on schedule
- Your next iPhone: iPhone 3.0 update or iPhone 3G S?
- FAQ: What iPhone 3.0 means to you
- Palm Pre vs iPhone 3.0 vs Blackberry Storm 2
- Instant analysis: With iPhone OS 3.0, Apple opens the creativity coffers
- Apple struts iPhone 3.0, touts 100 new features
- iPhone 3.0 preview sways 20% of cell phone owners to buy Apple
Read more about Security in Computerworld's Security Topic Center.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!