4 August 2007 @ 18:25First iPhone exploit patched

The first iPhone update was released July 30, 2007 only days after the exploit was announced, meanwhile, one of the researchers credited for finding the exploit bashes Apple and their stance on security.

Apple Store

From Apple’s site, the iPhone v1.0.1 Update includes the following:

iPhone v1.0.1 Update
• Safari
• CVE-ID: CVE-2007-2400
• Available for: iPhone v1.0
• Impact: Visiting a malicious website may allow cross-site scripting
• Description: Safari’s security model prevents JavaScript in remote web pages from modifying pages outside of their domain. A race condition in page updating combined with HTTP redirection may allow JavaScript from one page to modify a redirected page. This could allow cookies and pages to be read or arbitrarily modified. This update addresses the issue by correcting access control to window properties. Credit to Lawrence Lai, Stan Switzer, and Ed Rowe of Adobe Systems, Inc. for reporting this issue.
• Safari
• CVE-ID: CVE-2007-3944
• Available for: iPhone v1.0
• Impact: Viewing a maliciously crafted web page may lead to arbitrary code execution
• Description: Heap buffer overflows exist in the Perl Compatible Regular Expressions (PCRE) library used by the JavaScript engine in Safari. By enticing a user to visit a maliciously crafted web page, an attacker may trigger the issue, which may lead to arbitrary code execution. This update addresses the issue by performing additional validation of JavaScript regular expressions. Credit to Charlie Miller and Jake Honoroff of Independent Security Evaluators for reporting these issues.
• WebCore
• CVE-ID: CVE-2007-2401
• Available for: iPhone v1.0
• Impact: Visiting a malicious website may allow cross-site requests
• Description: An HTTP injection issue exists in XMLHttpRequest when serializing headers into an HTTP request. By enticing a user to visit a maliciously crafted web page, an attacker could trigger a cross-site scripting issue. This update addresses the issue by performing additional validation of header parameters. Credit to Richard Moore of Westpoint Ltd. for reporting this issue.
• WebKit
• CVE-ID: CVE-2007-3742
• Available for: iPhone v1.0
• Impact: Look-alike characters in a URL could be used to masquerade a website
• Description: The International Domain Name (IDN) support and Unicode fonts embedded in Safari could be used to create a URL which contains look-alike characters. These could be used in a malicious web site to direct the user to a spoofed site that visually appears to be a legitimate domain. This update addresses the issue by through an improved domain name validity check.
• WebKit
• CVE-ID: CVE-2007-2399
• Available for: iPhone v1.0
• Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
• Description: An invalid type conversion when rendering frame sets could lead to memory corruption. Visiting a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution. Credit to Rhys Kidd of Westnet for reporting this issue.

Charlie Miller, one of the individuals credited with exposing the flaw, states that there will be many more similar exploits in the future. Miller warns that open source packages used in the iPhone and Mac OS X are often one or two versions out of date and have unfixed bugs that may be exploited.

Apple’s quick response to this exploit is commendable, but will they be able to keep up, or stay ahead of future exploits?

Be Sociable, Share!

by | Add a comment | Posted in apple, exploits, iphone, security | Link to this

Add a Comment

Show who you are with a Gravatar.

 

Sign up for PayPal and start accepting credit card payments instantly.

Staples Logo

Get fed!

rss icon subscribe to Geek stuff

rss icon Geek stuff in your inbox

Add the "Geek stuff" Google Gadget to your homepage

Add the "Daily Deals" Google Gadget to your homepage

Apparel

Search Amazon

Search Amazon.com
Search Amazon.co.uk

Recent Forum Topics

    Advert

    Web hosting by ICDSoft