Feeds

Apple squeezes out iPhone update before Black Hat

Nick of time

Internet Security Threat Report 2014

Apple pushed out a raft of security updates for its much hyped iPhone on Tuesday. Availability of the first iPhone patches comes just ahead of a planned presentation of problems with the phone's software due to take place at the Black Hat conference in Vegas on Thursday. Apple also updated its desktop software.

Several of the iPhone bugs, which inevitably have drawn the most attention, revolve around the security shortcomings of the Safari browser bundled with the phone. The worst of these involves a buffer overflow vulnerability in the JavaScript engine in Safari. This vulnerability created a potential means to execute malicious code simply by tricking a user of the smartphone into visiting a maliciously constructed website.

The critical flaw, discovered by Charlie Miller and Jake Honoroff of Independent Security Evaluators, is expected to be a core focus of the Miller's presentation on Mac OS X security at Black Hat on Thursday.

The iPhone v1.0.1 Update also covers a separate cross-site scripting flaw in Safari as well as a memory corruption flaw in WebKit that creates a mechanism for hackers to inject hostile code onto the device. The patch also covers an address spoofing bug in WebKit, the application framework engine for Mac OS X, and a cross-site scripting flaw in WebCore, the HTML layout engine for Mac OS X.

Users can apply the security upgrade through iTunes or by checking for updates manually, as explained in an advisory from the consumer electronics firm here. More details on the vulnerabilities can be found in a bulletin from security notification firm Secunia here.

Apple also released a more general security update for OS X and (less significantly) a third beta of Safari for Windows. These updates cover the corresponding flaws in Apple's iPhone software and a whole lot more. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.