Feeds

Update your iThings NOW: Apple splats scary SSL snooping bug in iOS

OS X Mavericks still VULNERABLE, millions at risk of web hijacking

Security for virtualized datacentres

Updated2 Apple has updated its mobile operating system iOS to patch a bug that blows apart the integrity of encrypted connections.

Versions 7.0.6 and 6.1.6, available now for download, fixes a vulnerability that could allow "an attacker with a privileged network position" to "capture or modify data in sessions protected by SSL/TLS," according to the iPhone maker. This is due to the Secure Transport component of the operating system failing to validate "the authenticity of the connection," suggesting some sort of failure to verify the certificate or identity of whatever system a vulnerable iDevice was connected to.

In short, users should apply the security update as soon as possible to avoid falling foul of a man-in-the-middle attack: we can imagine a malicious router or Wi-Fi access point exploiting this iOS flaw to silently masquerade as a legit server, and thus intercept and decrypt the private contents of a supposedly secure connection.

SSL and TLS are used the world over to prevent eavesdroppers from snooping on network traffic to and from sensitive services, such as banking and shopping websites and email servers. But this only works if the other end of the connection can be verified and trusted.

Apple admits "this issue was addressed by restoring missing validation steps." It reserved CVE-2014-1266 for the bug on January 8 this year, but when and how exactly the flaw was introduced and subsequently discovered is not clear.

The patch, weighing in between 16MB and 35MB, can be applied to any handheld running iOS 7, and even iPhone 3GSes and fourth-generation iPods running version 6 – a further clue that Apple considers this a very serious bug.

The next major release, iOS 7.1, is due out in March once developers have finished beta testing it. ®

Updated at 1150 GMT, February 22

For those wondering what the problem is, it first appeared that there was an issue in Apple's port of download tool Curl involving the verification of the "common name", aka hostname, records in SSL certificates. It was feared that bug was part of a wider problem.

Although that particular glitch is real and irritating, it turned out not to be the showstopper that Apple patched on Friday: others have since uncovered a staggering cock-up that appeared in the latest available open-source code for Apple's SSL security library, specifically in the SSLVerifySignedServerKeyExchange() function.

Aptly, it's a double goto fail; so the code skips a vital verification step when exchanging keys with the server to prove its identity and authenticity. Oops.

The bad news is that this iOS validation bug also exists in Apple's Mac OS X 10.9.1 desktop operating system. Any software relying on Apple's SSL library will be at risk until it is patched, it's understood. Google Chrome and Mozilla Firefox are among the applications not affected, but Apple's Safari, Mail, Messages, and many other programs, are thought to be vulnerable.

"Update your Apple devices and systems as soon as possible to the latest available versions. Do not use untrusted networks (especially Wi-Fi) while traveling, until you can update the devices from a trusted network," advised Alex Radocea of computer security tech biz CrowdStrike in a briefing about today's SSL vulnerability.

"On unpatched mobile and laptop devices, set 'Ask to Join Networks' setting to OFF, which will prevent them from showing prompts to connect to untrusted networks."

Secure remote control for conventional and virtual desktops

More from The Register

next story
NASTY SSL 3.0 vuln to be revealed soon – sources (Update: It's POODLE)
So nasty no one's even whispering until patch is out
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
FBI boss: We don't want a backdoor, we want the front door to phones
Claims it's what the Founding Fathers would have wanted – catching killers and pedos
Kill off SSL 3.0 NOW: HTTPS savaged by vicious POODLE
Pull it out ASAP, it is SWISS CHEESE
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
Four new patches for open-source crypto libraries
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.