Apple patches Pwn2Own, Comodo hack bugs
Updates iOS and Mac OS X to plug holes in iPhone, iPad, Safari, Mac OS X, iPod Touch
Computerworld - Apple today patched bugs in iOS and Safari used at last month's Pwn2Own hacking contest by three teams of researchers who collectively earned $45,000 for their work.
In an iOS update to version 4.3.2, Apple patched a bug exploited by four-time Pwn2Own winner Charlie Miller and his research partner Dion Blazakis, who hacked an iPhone at Pwn2Own.
Apple had fixed the same flaw in Mac OS X on March 21, but had left iOS -- the operating system for the iPhone, iPad and iPod Touch -- unprotected until today.
The same update also patched a vulnerability in WebKit -- the browser engine that powers Safari on Mac OS X and iOS, and the browser on BlackBerry devices -- that was exploited by a trio of researchers to hack a BlackBerry. iOS 4.3.2 also closed a second WebKit hole that was used by a team from the French security company Vupen to breach Safari on a MacBook Air.
Apple quashed the two WebKit bugs in Safari with a separate update that brought Apple's browser to version 5.0.5.
A third update addressed a March theft of digital certificates used to authenticate sites owned by some of the Web's biggest name, including Google, Microsoft, Mozilla, Skype and Yahoo.
On March 15, attackers used a valid username and password to obtain nine SSL certificates -- which essentially prove that a site is what it says it is -- from a Comodo certificate reseller. Comodo claimed that the hack originated in Iran and may have been state-sponsored; later, an Iranian hacker claimed responsibility, but denied he was acting on orders from his country's government.
"Safari relies on the certificate store of the host operating system to determine if an SSL server certificate is trustworthy," Apple said in an advisory for an update to Mac OS X. "For Mac OS X systems, this issue is addressed with Security Update 2011-002. For iOS, this issue is addressed with iOS 4.3.2 and iOS 4.2.7."
iOS 4.2.7 is aimed at iPhone 4s connected to Verizon's mobile network.
Users running Safari on Windows must turn to Microsoft for a patch, Apple said.
Microsoft issued Comodo-hack patches for Windows XP, Vista and Windows 7 on March 23.
Mac users can download the Safari and OS X updates from the Apple site, or install them using the operating system's integrated update service. iPhone, iPad and iPod Touch users must connect their devices to a Mac or PC equipped with Apple's iTunes music software.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer or subscribe to Gregg's RSS feed . His e-mail address is firstname.lastname@example.org.
- Hands on: Apple's Mac Pro is the fastest Mac ever
- Apple CFO to retire in September after he cashes in $53M stock award
- Apple's CarPlay to spark mobile apps war in your car
- Apple retires Snow Leopard from support, leaves 1 in 5 Macs vulnerable to attacks
- Apple patches critical 'gotofail' bug with Mavericks update
- Why Apple needs a $700 MacBook Air
- Apple takes top spot in brand value computation
- Apple gets a patent for health-monitoring ear buds
- Apple shifts to hardware-first TV strategy with revamped set-top box
- iTunes is almost as big a biz as OEM Windows
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts