From time to time Apple takes care of that around iOS is loud, so around all devices iPod, iPad or iPhone. And I do not mean advertising or new functionality, but security issues of this system. It is no different this time, though Apple's attitude is rather slight " subtle ":
About the security content of iOS 7.0.6
This document describes the security content of iOS 7.0.6.
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see "Apple Security Updates".
Available for: iPhone 4 and later, iPod touch (5th generation), iPad 2 and later
Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS
Description: Secure Transport failed to validate the authenticity of the connection. This issue was addressed by restoring missing validation steps.
Important: Mention of third-party websites and products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the selection, performance or use of information or products found at third-party websites. Apple provides this only as a convenience to our users. Apple has not tested the information found on these sites and makes no representations regarding its accuracy or reliability. There are risks inherent in the use of any information or products found on the Internet, and Apple assumes no responsibility in this regard. Please understand that a third-party site is independent from Apple and that Apple has no control over the content on that website. Please contact the vendor for additional information.
Last Modified: Feb 21, 2014
What have you been up Apple? He allowed that the new system was allowed to be subjected to attack by "Man in the middle" mode, which main principle is to capture traffic between our device with the logo of an apple and the home server from which the services at the time you use. By doing it the person who is looking for this type of traffic even via HTTPS is able decipher the data and gain access to previously protected things. Similar action is used in modern firewalls where every move is uncertificate, then browsed, then folded back and fired on.
Such an attack can be done when being in the same network as the attacker, and I do not mean here just the same Wi-Fi network with the same SSID, but also the same network in a general sense because if someone has access to the provider server also can capture our data.
So far in the network has not yet appeared tools to quickly carry out this type of attack , but the truth is that a person who has knowledge and will want to use it without trouble will be able to carry out such a process . Flavor to the whole thing is that in this way we can foolupdate mechanism thus not allowing the device to patch the hole. Not only that, if someone will prepare the parcel properly update the whole process can be carried out with downloading the new "firmware " and after entering the settings we will see versions 7.0.7, when in fact it will be 7.0.6.
At the end of the enthusiast quotes a piece of code responsible for a security hole:
SSLVerifySignedServerKeyExchange(SSLContext *ctx, bool isRsa, SSLBuffer signedParams,
uint8_t *signature, UInt16 signatureLen)
if ((err = SSLHashSHA1.update(&hashCtx, &serverRandom)) != 0)
if ((err = SSLHashSHA1.update(&hashCtx, &signedParams)) != 0)
if ((err = SSLHashSHA1.final(&hashCtx, &hashOut)) != 0)
While still in high school computer science master has banned you from using goto (especially in terms of its second occurrence, which always leads to proper verification), I remember like it was today! And because of Apple's developers have grounds for nothing they vulnerable iOS J