PDFs that exploit iPhone, iPad zero-day available on the Web
German government security agency warns of possible attacks; Apple promises a patch
Computerworld - Hours after developers revealed they had exploited bugs in Apple's iOS to "jailbreak" iPhones and iPads, German government security authorities warned that one of the flaws could be put to malicious use.
Malformed files that exploit the vulnerability have been publicly posted on the Internet.
Late Wednesday, Germany's Federal Office for Information Security, known by its German-language initials of BSI for "Bundesamt fuer Sicherheit in der Informationstechnik," warned citizens that the iOS bug could be used by criminals to hijack iPhones, iPads and iPod Touches.
"Even clicking a crafted PDF document or surfing to a website with the PDF documents are sufficient to infect the mobile device with malicious software," the BSI said in a translation of the German-language alert.
PDF files that successfully exploit the vulnerability are available on the Web, according to Mikko Hypponen, chief research officer of Helsinki-based antivirus company F-Secure.
And those PDFs could be used by miscreants to hack iOS devices simply by luring users to malicious sites, said Andrew Storms, director of security operations at nCircle Security.
iPhone and iPad users steered to a malicious PDF -- via a link embedded in an email, for instance -- would not receive any warning or be required to take additional action.
"This is a click-and-pwn kind of situation since the user is not prompted to confirm opening the file," said Storms, referring to the term used by researchers to describe hijacking a device.
The BSI warning came just hours after a group of developers released an updated version of JailbreakMe, a tool that hacks iOS so iPhone and iPad users can install software not sanctioned by Apple.
Those developers exploited a pair of vulnerabilities, including one in the font parsing of the PDF viewer integrated with the iOS version of Safari, and another that bypassed anti-malware defenses such as ASLR (address space layout randomization).
Wednesday, security experts said that the same vulnerabilities, particularly the one exploitable through malicious PDF files, could be used by criminals to hijack Apple's popular iPhone and iPad.
"They're certainly a threat, and would be easy to make malicious," said Charlie Miller, a noted Mac OS X and iOS vulnerability researcher who works for Denver-based Accuvant.
Miller also speculated that Apple would quickly patch the vulnerabilities, perhaps even faster than last year when it faced a similar situation. In August 2010, Apple patched a pair of bugs used by JailbreakMe 2.0 just 10 days after the tool's release.
News of JailbreakMe 3.0's impending release had leaked several days before Wednesday's official launch, noted Miller, and should have given Apple even more warning.
Yesterday's BSI alert was similar to one it issued last August after JailbreakMe 2.0 appeared.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!