Update: Apple rushes critical iPhone SMS patch
Fixes flaw one day after researchers show how to hijack smartphones with text messages
Computerworld - Just a day after researchers showed how hackers can hijack iPhones with a series of malicious text messages, Apple patched the problem.
The new iPhone 3.0.1 software, which Apple released today to iTunes around 2 p.m. Eastern, addresses a vulnerability disclosed Thursday by researchers Charlie Miller, an analyst with Independent Security Evaluators, and Collin Mulliner from the Technical University of Berlin, at the Black Hat security conference in Las Vegas.
The vulnerability, which Miller first discussed at a Singapore security conference earlier this month, lets hackers take control of an iPhone by using a series of SMS, or text, messages.
Miller and Mulliner demonstrated the flaw yesterday during a Black Hat presentation, showing how hackers could send apparently-harmless text messages, including messages that the iPhone's owner never sees, to silently operate smartphone features such as its camera or microphone.
Miller had reported the bug to Apple on June 16.
"Receiving a maliciously crafted SMS message may lead to an unexpected service interruption or arbitrary code execution," Apple acknowledged in the Friday security advisory that accompanied the patch.
Apple, which does not assign vulnerabilities a rating or ranking as do companies such as Microsoft and Oracle, instead uses the phrase "arbitrary code execution" to label its most serious flaws.
Earlier today, the BBC reported that Apple would patch the bug Saturday, quoting a representative for O2, Apple's exclusive carrier partner in the U.K.
Also today, Miller said he couldn't confirm that a patch was imminent. "They do it when they do it," he said, referring to Apple's patching process.
This is the first update to the iPhone software since Apple unveiled Version 3.0 on June 17.
Miller and Mulliner have published a research paper, "Fuzzing the Phone in Your Phone" (PDF document), that spells out the vulnerability in smartphones, including the iPhone.
Users can wait out the update interval -- iTunes automatically checks Apple's update servers once a week -- or retrieve iPhone 3.0.1 manually by selecting "Check for Update" under the iTunes Help menu and then docking the iPhone to a PC or Macintosh.
- Apple has bigger plans than just song ID with Shazam deal
- Automakers show off in-vehicle Wi-Fi, new smartphone interfaces
- First-to-market means diddly when it comes to smartwatches
- Apple slates WWDC for June 2-6, sets up ticket lottery
- Nadella to Cook on Office revenue sharing: Drop dead
- Microsoft scraps 'Windows-first' practice, puts Office on iPad before Surface
- iOS tops Android for Web browsing in U.S. and other developed nations
- Microsoft's free OneNote vaults to top of Mac App Store chart
- Apple discounts iPhone 5C 8%-9% in five markets via storage cuts
- Microsoft's OneNote strategy: Battle Evernote, or something bigger?
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts