Menu
iOS 7.0, iOS 7.0.4, iOS 7.1 now can be done!!!

iOS 7.0, iOS 7.0.4, iOS 7.1 now can…

Almost last minute breaki...

Angry Birds in a new form the RPG game

Angry Birds in a new form the RPG g…

After using charakteru fr...

Installing Windows 8.1 from USB stick

Installing Windows 8.1 from USB sti…

Windows 8.1 was released ...

Open links in the Windows 8.1 desktop Internet Explorer mode every time

Open links in the Windows 8.1 deskt…

When using Windows 8 in d...

How to run the data deduplication on Windows 8 and Windows 8.1

How to run the data deduplication o…

All known data de-duplica...

SD card with Wi-Fi interface

SD card with Wi-Fi interface

There are many devices an...

Windows Phone 8.1 is comming

Windows Phone 8.1 is comming

Operating system Windows ...

Micrososft product activation via Active Directory not KMS

Micrososft product activation via A…

If anyone ever looked for...

Setting up your own domain name in the Outlook.com mail service

Setting up your own domain name in …

Few people realize how mu...

Windows 8.1 update is here

Windows 8.1 update is here

Almost everyone who heard...

Prev Next

The issue of security, or lack of security in iOS 7.0.6 Featured

The issue of security, or lack of security in iOS 7.0.6

From time to time Apple takes care of that around iOS is loud, so around all devices iPod, iPad or iPhone. And I do not mean advertising or new functionality, but security issues of this system. It is no different this time, though Apple's attitude is rather slight " subtle ": 

 

About the security content of iOS 7.0.6

This document describes the security content of iOS 7.0.6.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see "Apple Security Updates".

iOS 7.0.6

Data Security

Available for: iPhone 4 and later, iPod touch (5th generation), iPad 2 and later

Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS

Description: Secure Transport failed to validate the authenticity of the connection. This issue was addressed by restoring missing validation steps.

CVE-ID

CVE-2014-1266

Important: Mention of third-party websites and products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the selection, performance or use of information or products found at third-party websites. Apple provides this only as a convenience to our users. Apple has not tested the information found on these sites and makes no representations regarding its accuracy or reliability. There are risks inherent in the use of any information or products found on the Internet, and Apple assumes no responsibility in this regard. Please understand that a third-party site is independent from Apple and that Apple has no control over the content on that website. Please contact the vendor for additional information.

Last Modified: Feb 21, 2014

 

What have you been up Apple? He allowed that the new system was allowed to be subjected to attack by "Man in the middle" mode, which main principle is to capture traffic between our device with the logo of an apple and the home server from which the services at the time you use. By doing it the person who is looking for this type of traffic even via HTTPS is able decipher the data and gain access to previously protected things. Similar action is used in modern firewalls where every move is uncertificate, then browsed, then folded back and fired on.

 

Such an attack can be done when being in the same network as the attacker, and I do not mean here just the same Wi-Fi network with the same SSID, but also the same network in a general sense because if someone has access to the provider server also can capture our data.

 

So far in the network has not yet appeared tools to quickly carry out this type of attack , but the truth is that a person who has knowledge and will want to use it without trouble will be able to carry out such a process . Flavor to the whole thing is that in this way we can foolupdate mechanism thus not allowing the device to patch the hole. Not only that, if someone will prepare the parcel properly update the whole process can be carried out with downloading the new "firmware " and after entering the settings we will see versions 7.0.7, when in fact it will be 7.0.6.

 

At the end of the enthusiast quotes a piece of code responsible for a security hole:

 

static OSStatus

SSLVerifySignedServerKeyExchange(SSLContext *ctx, bool isRsa, SSLBuffer signedParams,

uint8_t *signature, UInt16 signatureLen)

{

OSStatus err;

...

if ((err = SSLHashSHA1.update(&hashCtx, &serverRandom)) != 0)

goto fail;

if ((err = SSLHashSHA1.update(&hashCtx, &signedParams)) != 0)

goto fail;

goto fail;

if ((err = SSLHashSHA1.final(&hashCtx, &hashOut)) != 0)

goto fail;

...

fail:

SSLFreeBuffer(&signedHashes);

SSLFreeBuffer(&hashCtx);

return err;

}

 

While still in high school computer science master has banned you from using goto (especially in terms of its second occurrence, which always leads to proper verification), I remember like it was today! And because of Apple's developers have grounds for nothing they vulnerable iOS J

 

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.



Uzupełnij układankę ;-)Joomla CAPTCHA
back to top

HDT@