Apple patches 10 iPhone bugs, 4 QuickTime flaws
Plugs iPhone browser, SMS holes; fixes file format flaws in oft-patched player software
Computerworld - Apple issued a pair of updates yesterday that patched 10 vulnerabilities in its iPhone software and four in its QuickTime player program.
One of the 10 flaws in the iPhone's software was related to a bug that Apple patched in a hurry last July, just a day after security researchers showed how hackers could hijack iPhones with a series of malicious text messages.
Wednesday's update patched a vulnerability in the iPhone's telephony service that attackers could exploit to disrupt SMS (Short Message Service) text messaging on the smartphone, Apple said in an accompanying security advisory. Apple credited Charlie Miller of Independent Security Evaluators and Collin Mulliner from the Technical University Berlin with reporting the flaw.
In late July, Miller and Mulliner demonstrated a more serious SMS vulnerability at the Black Hat security conference, showing how hackers could send apparently-harmless text messages, including messages that the iPhone's owner never sees, to silently operate smartphone features such as its camera or microphone.
Apple quashed that bug in a single-patch update released July 31.
"This was a different bug [than July's]," said Miller in an e-mail exchange. "We revealed it at Black Hat but hadn't given Apple advance notice since it was pretty minor. It was only a DoS [denial of service] and didn't even interrupt calls."
At the Black Hat presentation Miller and Mulliner gave in July, Miller said he thought there were more SMS bugs to be found in the iPhone; the pair had been able to test only a small subset of the possible scenarios.
Only two of the 10 vulnerabilities Apple patched with iPhone 3.1 were classified as critical. Although Apple doesn't rank or score flaws like other vendors, it uses the phrasing "arbitrary code execution" to denote vulnerabilities that could be used by attackers to gain complete control of the iPhone.
Of the two critical flaws, the first could be triggered by rigged audio files, while the second could be exploited through a malicious Web site designed to leverage a bug in WebKit, the rendering engine that powers the iPhone's Safari browser. Four of the 10 vulnerabilities involved WebKit.
Other vulnerabilities had the potential to expose an iPhone owner's Microsoft Exchange e-mail account, let unauthorized people access deleted e-mails or a supposedly-locked iPhone, or disclose sensitive information on the smartphone.
Apple has had problems with the iPhone's password-locking feature before. In August 2008, a researcher discovered a bug that allowed users to bypass a password-protected lock had resurfaced in iPhone 2.0. Apple quickly confirmed the bug, and patched it a month later.
Users can wait out the update interval -- iTunes automatically checks Apple's update servers once a week -- or retrieve iPhone 3.1 manually by selecting "Check for Update" under the iTunes Help menu and then docking the iPhone to a PC or Macintosh.
- Apple's CarPlay vs. MirrorLink: Is there a need for both?
- Apple's CarPlay to spark mobile apps war in your car
- iTunes is almost as big a biz as OEM Windows
- Icahn says 'I can't' and stops $50B fight over Apple stock buyback
- Lenovo-Moto deal's impact on Apple? Zip
- Office 365 turns one, but success is tough to tally
- Everyone bets on bigger iPhone for '14
- Apple's iPod business collapses as revenue becomes a rounding error
- Update: More than 1B smartphones were shipped in 2013
- Cook admits Apple blew the call on the iPhone 5C
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts