If for no other reason, and there are scores of really good reasons, you should download and install iOS 7 on every compatible iPhone, iPad and/or iPod touch you own just for the security. Covering more than 40 vulnerabilities — i.e. WebKit, Safari, Kernel, CoreGraphics, Certificates, etc — iOS 7 security content is wide ranging and not a little scary.
Below you will find mentions of “unexpected application termination” and “arbitrary code execution,” which can be summarized as command then control — that thing black hat hackers do. Moreover, unlike most security, mobile or otherwise, iOS 7 security content includes more than the usual enumeration of browser vulnerabilities, but also the kernel, file system and core graphics.
All kinds of vulnerable followed by all kinds of patches — if your iThings are iOS 7 compatible, you really need to get this update.
And, without further ado, here is a slightly edited, for length, yet fully frightening version of the iOS 7 security content:
Certificate Trust Policy
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Root certificates have been updated
Description: Several certificates were added to or removed from the list of system roots.
CoreGraphics
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of JBIG2 encoded data in PDF files. This issue was addressed through additional bounds checking.
— CVE-2013-1025 : Felix Groebert of the Google Security Team
CoreMedia
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in the handling of Sorenson encoded movie files. This issue was addressed through improved bounds checking.
— CVE-2013-1019 : Tom Gallagher (Microsoft) & Paul Bates (Microsoft)
working with HP’s Zero Day Initiative
Data Protection
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Apps could bypass passcode-attempt restrictions
Description: A privilege separation issue existed in Data Protection. An app within the third-party sandbox could repeatedly attempt to determine the user’s passcode regardless of the user’s “Erase Data” setting. This issue was addressed by requiring additional entitlement checks.
— CVE-2013-0957 : Jin Han of the Institute for Infocomm Research working with Qiang Yan and Su Mon Kywe of Singapore Management University
Data Security
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information
Description: TrustWave, a trusted root CA, has issued, and subsequently revoked, a sub-CA certificate from one of its trusted anchors. This sub-CA facilitated the interception of communications secured by Transport Layer Security (TLS). This update added the involved sub-CA certificate to OS X’s list of untrusted certificates.
— CVE-2013-5134
dyld
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: An attacker who has arbitrary code execution on a device may be able to persist code execution across reboots
Description: Multiple buffer overflows existed in dyld’s openSharedCacheFile() function. These issues were addressed through improved bounds checking.
— CVE-2013-3950 : Stefan Esser
File Systems
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: An attacker who can mount a non-HFS filesystem may be able to cause an unexpected system termination or arbitrary code execution with kernel privileges
Description: A memory corruption issue existed in the handling of AppleDouble files. This issue was addressed by removing support for AppleDouble files.
— CVE-2013-3955 : Stefan Esser
ImageIO
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in the handling of JPEG2000 encoded data in PDF files. This issue was addressed through additional bounds checking.
— CVE-2013-1026 : Felix Groebert of the Google Security Team
IOKit
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Background applications could inject user interface events into the foreground app
Description: It was possible for background applications to inject user interface events into the foreground application using the task completion or VoIP APIs. This issue was addressed by enforcing access controls on foreground and background processes that handle interface events.
— CVE-2013-5137 : Mackenzie Straight at Mobile Labs
IOKitUser
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A malicious local application could cause an unexpected system termination
Description: A null pointer dereference existed in IOCatalogue. The issue was addressed through additional type checking.
— CVE-2013-5138 : Will Estes
IOSerialFamily
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Executing a malicious application may result in arbitrary code execution within the kernel
Description: An out of bounds array access existed in the IOSerialFamily driver. This issue was addressed through additional bounds checking.
— CVE-2013-5139 : @dent1zt
IPSec
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: An attacker may intercept data protected with IPSec Hybrid Auth
Description: The DNS name of an IPSec Hybrid Auth server was not being matched against the certificate, allowing an attacker with a certificate for any server to impersonate any other. This issue was addressed by improved certificate checking.
— CVE-2013-1028 : Alexander Traud of www.traud.de
Kernel
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A remote attacker can cause a device to unexpectedly restart
Description: Sending an invalid packet fragment to a device can cause a kernel assert to trigger, leading to a device restart. The issue was addressed through additional validation of packet fragments.
— CVE-2013-5140 : Joonas Kuorilehto of Codenomicon, an anonymous researcher working with CERT-FI, Antti LevomAki and Lauri Virtanen of Vulnerability Analysis Group, Stonesoft
Kernel
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A malicious local application could cause device hang
Description: An integer truncation vulnerability in the kernel socket interface could be leveraged to force the CPU into an infinite loop. The issue was addressed by using a larger sized variable.
— CVE-2013-5141 : CESG
Kernel
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: An attacker on a local network can cause a denial of service
Description: An attacker on a local network can send specially crafted IPv6 ICMP packets and cause high CPU load. The issue was addressed by rate limiting ICMP packets before verifying their checksum.
— CVE-2011-2391 : Marc Heuse
Kernel
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Kernel stack memory may be disclosed to local users Description: An information disclosure issue existed in the msgctl and segctl APIs. This issue was addressed by initializing data structures returned from the kernel.
— CVE-2013-5142 : Kenzley Alphonse of Kenx Technology, Inc
Kernel
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Unprivileged processes could get access to the contents of
kernel memory which could lead to privilege escalation
Description: An information disclosure issue existed in the mach_port_space_info API. This issue was addressed by initializing the iin_collision field in structures returned from the kernel.
— CVE-2013-3953 : Stefan Esser
Kernel
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Unprivileged processes may be able to cause an unexpected system termination or arbitrary code execution in the kernel
Description: A memory corruption issue existed in the handling of arguments to the posix_spawn API. This issue was addressed through additional bounds checking.
— CVE-2013-3954 : Stefan Esser
Kext Management
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: An unauthorized process may modify the set of loaded kernel extensions
Description: An issue existed in kextd’s handling of IPC messages from unauthenticated senders. This issue was addressed by adding additional authorization checks.
— CVE-2013-5145 : “Rainbow PRISM”
libxml
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in livxml. These issues were addressed by updating libxml to version 2.9.0.
— CVE-2011-3102 : Juri Aedla
— CVE-2012-0841
— CVE-2012-2807 : Juri Aedla
— CVE-2012-5134 : Google Chrome Security Team (Juri Aedla)
libxslt
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in libxslt. These issues were addressed by updating libxslt to version 1.1.28.
— CVE-2012-2825 : Nicolas Gregoire
— CVE-2012-2870 : Nicolas Gregoire
— CVE-2012-2871 : Kai Lu of Fortinet’s FortiGuard Labs, Nicolas Gregoire
Passcode Lock
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A person with physical access to the device may be able to bypass the screen lock
Description: A race condition issue existed in the handling of phone calls and SIM card ejection at the lock screen. This issue was addressed through improved lock state management.
— CVE-2013-5147 : videosdebarraquito
Personal Hotspot
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: An attacker may be able to join a Personal Hotspot network
Description: An issue existed in the generation of Personal Hotspot passwords, resulting in passwords that could be predicted by an attacker to join a user’s Personal Hotspot. The issue was addressed by generating passwords with higher entropy.
— CVE-2013-4616 : Andreas Kurtz of NESO Security Labs and Daniel Metz of University Erlangen-Nuremberg
Push Notifications
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: The push notification token may be disclosed to an app
contrary to the user’s decision
Description: An information disclosure issue existed in push notification registration. Apps requesting access to the push notification access received the token before the user approved the app’s use of push notifications. This issue was addressed by withholding access to the token until the user has approved access.
— CVE-2013-5149 : Jack Flintermann of Grouper, Inc.
Safari
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in the handling of XML files. This issue was addressed through additional bounds checking.
— CVE-2013-1036 : Kai Lu of Fortinet’s FortiGuard Labs
Safari
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: History of pages recently visited in an open tab may remain after clearing of history
Description: Clearing Safari’s history did not clear the back/forward history for open tabs. This issue was addressed by clearing the back/forward history.
— CVE-2013-5150
Safari
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Viewing files on a website may lead to script execution even when the server sends a ‘Content-Type: text/plain’ header
Description: Mobile Safari sometimes treated files as HTML files even when the server sent a ‘Content-Type: text/plain’ header. This may lead to cross-site scripting on sites that allow users to upload files. This issue was addressed through improved handling of files when ‘Content-Type: text/plain’ is set.
— CVE-2013-5151 : Ben Toews of Github
Safari
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a malicious website may allow an arbitrary URL to be displayed
Description: A URL bar spoofing issue existed in Mobile Safari. This issue was addressed through improved URL tracking.
— CVE-2013-5152 : Keita Haga of keitahaga.com, Lukasz Pilorz of RBS
Sandbox
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Applications that are scripts were not sandboxed
Description: Third-party applications which used the #! syntax to run a script were sandboxed based on the identity of the script interpreter, not the script. The interpreter may not have a sandbox defined, leading to the application being run unsandboxed. This issue was addressed by creating the sandbox based on the identity of the
script.
— CVE-2013-5154 : evad3rs
Sandbox
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Applications can cause a system hang
Description: Malicious third-party applications that wrote specific values to the /dev/random device could force the CPU to enter an infinite loop. This issue was addressed by preventing third-party applications from writing to /dev/random.
— CVE-2013-5155 : CESG
Social
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Users recent Twitter activity could be disclosed on devices with no passcode.
Description: An issue existed where it was possible to determine what Twitter accounts a user had recently interacted with. This issue was resolved by restricting access to the Twitter icon cache.
— CVE-2013-5158 : Jonathan Zdziarski
Springboard
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A person with physical access to a device in Lost Mode may be able to view notifications
Description: An issue existed in the handling of notifications when a device is in Lost Mode. This update addresses the issue with improved lock state management.
— CVE-2013-5153 : Daniel Stangroom
Telephony
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Malicious apps could interfere with or control telephony functionality
Description: An access control issue existed in the telephony subsystem. Bypassing supported APIs, sandboxed apps could make requests directly to a system daemon interfering with or controlling telephony functionality. This issue was addressed by enforcing access controls on interfaces exposed by the telephony daemon.
— CVE-2013-5156 : Jin Han of the Institute for Infocomm Research working with Qiang Yan and Su Mon Kywe of Singapore Management University; Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee from the Georgia Institute of Technology
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Sandboxed apps could send tweets without user interaction or permission
Description: An access control issue existed in the Twitter subsystem. Bypassing supported APIs, sandboxed apps could make requests directly to a system daemon interfering with or controlling Twitter functionality. This issue was addressed by enforcing access controls on interfaces exposed by the Twitter daemon.
— CVE-2013-5157 : Jin Han of the Institute for Infocomm Research working with Qiang Yan and Su Mon Kywe of Singapore Management University; Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee from the Georgia Institute of Technology
WebKit
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.
— CVE-ID
— CVE-2013-0879 : Atte Kettunen of OUSPG
— CVE-2013-0991 : Jay Civelli of the Chromium development community
— CVE-2013-0992 : Google Chrome Security Team (Martin Barbella)
— CVE-2013-0993 : Google Chrome Security Team (Inferno)
— CVE-2013-0994 : David German of Google
— CVE-2013-0995 : Google Chrome Security Team (Inferno)
— CVE-2013-0996 : Google Chrome Security Team (Inferno)
— CVE-2013-0997 : Vitaliy Toropov working with HP’s Zero Day Initiative
— CVE-2013-0998 : pa_kt working with HP’s Zero Day Initiative
— CVE-2013-0999 : pa_kt working with HP’s Zero Day Initiative
— CVE-2013-1000 : Fermin J. Serna of the Google Security Team
— CVE-2013-1001 : Ryan Humenick
— CVE-2013-1002 : Sergey Glazunov
— CVE-2013-1003 : Google Chrome Security Team (Inferno)
— CVE-2013-1004 : Google Chrome Security Team (Martin Barbella)
— CVE-2013-1005 : Google Chrome Security Team (Martin Barbella)
— CVE-2013-1006 : Google Chrome Security Team (Martin Barbella)
— CVE-2013-1007 : Google Chrome Security Team (Inferno)
— CVE-2013-1008 : Sergey Glazunov
— CVE-2013-1010 : miaubiz
— CVE-2013-1037 : Google Chrome Security Team
— CVE-2013-1038 : Google Chrome Security Team
— CVE-2013-1039 : own-hero Research working with iDefense VCP
— CVE-2013-1040 : Google Chrome Security Team
— CVE-2013-1041 : Google Chrome Security Team
— CVE-2013-1042 : Google Chrome Security Team
— CVE-2013-1043 : Google Chrome Security Team
— CVE-2013-1044 : Apple
— CVE-2013-1045 : Google Chrome Security Team
— CVE-2013-1046 : Google Chrome Security Team
— CVE-2013-1047 : miaubiz
— CVE-2013-2842 : Cyril Cattiaux
— CVE-2013-5125 : Google Chrome Security Team
— CVE-2013-5126 : Apple
— CVE-2013-5127 : Google Chrome Security Team
— CVE-2013-5128 : Apple
WebKit
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a malicious website may lead to information disclosure
Description: An information disclosure issue existed in the handling of the window.webkitRequestAnimationFrame() API. A maliciously crafted website could use an iframe to determine if another site used window.webkitRequestAnimationFrame(). This issue was addressed through improved handling of window.webkitRequestAnimationFrame().
— CVE-2013-5159
WebKit
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Copying and pasting a malicious HTML snippet may lead to a cross-site scripting attack
Description: A cross-site scripting issue existed in the handling of copied and pasted data in HTML documents. This issue was addressed through additional validation of pasted content.
— CVE-2013-0926 : Aditya Gupta, Subho Halder, and Dev Kar of xys3c (xysec.com)
WebKit
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack
Description: A cross-site scripting issue existed in the handling of iframes. This issue was addressed through improved origin tracking.
— CVE-2013-1012 : Subodh Iyengar and Erling Ellingsen of Facebook
WebKit
Available for: iPhone 3GS and later,
iPod touch (4th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to an information disclosure
Description: An information disclosure issue existed in XSSAuditor. This issue was addressed through improved handling of URLs.
— CVE-2013-2848 : Egor Homakov
WebKit
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Dragging or pasting a selection may lead to a cross-site scripting attack
Description: Dragging or pasting a selection from one site to another may allow scripts contained in the selection to be executed in the context of the new site. This issue is addressed through additional validation of content before a paste or a drag and drop operation.
— CVE-2013-5129 : Mario Heiderich
WebKit
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack
Description: A cross-site scripting issue existed in the handling of URLs. This issue was addressed through improved origin tracking.
— CVE-2013-5131 : Erling A Ellingsen
When Apple gets round to listing iOS 7 security content, you will be able to find it here.
Leave a Reply