Apple security announcement for iOS 7.1 credits the evad3rs, i0n1c, and others with finding the vulnerabilities closed by the firmware update.
The evad3rs are credited for finding Backup, Crash Reporting, dyld, and kernel vulnerabilities.
You can all the security updates listed below:
----- ● Backup Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A maliciously crafted backup can alter the filesystem Description: A symbolic link in a backup would be restored, allowing subsequent operations during the restore to write to the rest of the filesystem. This issue was addressed by checking for symbolic links during the restore process. CVE-2013-5133 : evad3rs
● Certificate Trust Policy Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Root certificates have been updated Description: Several certificates were added to or removed from the list of system roots.
● Configuration Profiles Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Profile expiration dates were not honored Description: Expiration dates of mobile configuration profiles were not evaluated correctly. The issue was resolved through improved handling of configuration profiles. CVE-2014-1267
● CoreCapture Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application can cause an unexpected system termination Description: A reachable assertion issue existed in CoreCapture's handling of IOKit API calls. The issue was addressed through additional validation of input from IOKit. CVE-2014-1271 : Filippo Bigarella
● Crash Reporting Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A local user may be able to change permissions on arbitrary files Description: CrashHouseKeeping followed symbolic links while changing permissions on files. This issue was addressed by not following symbolic links when changing permissions on files. CVE-2014-1272 : evad3rs
● dyld Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Code signing requirements may be bypassed Description: Text relocation instructions in dynamic libraries may be loaded by dyld without code signature validation. This issue was addressed by ignoring text relocation instructions. CVE-2014-1273 : evad3rs
● FaceTime Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A person with physical access to the device may be able to access FaceTime contacts from the lock screen Description: FaceTime contacts on a locked device could be exposed by making a failed FaceTime call from the lock screen. This issue was addressed through improved handling of FaceTime calls. CVE-2014-1274
● ImageIO Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of JPEG2000 images in PDF files. This issue was addressed through improved bounds checking. CVE-2014-1275 : Felix Groebert of the Google Security Team
● ImageIO Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Viewing a maliciously crafted TIFF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in libtiff's handling of TIFF images. This issue was addressed through additional validation of TIFF images. CVE-2012-2088
● ImageIO Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Viewing a maliciously crafted JPEG file may lead to the disclosure of memory contents Description: An uninitialized memory access issue existed in libjpeg's handling of JPEG markers, resulting in the disclosure of memory contents. This issue was addressed through additional validation of JPEG files. CVE-2013-6629 : Michal Zalewski
● IOKit HID Event Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may monitor on user actions in other apps Description: An interface in IOKit framework allowed malicious apps to monitor on user actions in other apps. This issue was addressed through improved access control policies in the framework. CVE-2014-1276 : Min Zheng, Hui Xue, and Dr. Tao (Lenx) Wei of FireEye
● iTunes Store Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A man-in-the-middle attacker may entice a user into downloading a malicious app via Enterprise App Download Description: An attacker with a privileged network position could spoof network communications to entice a user into downloading a malicious app. This issue was mitigated by using SSL and prompting the user during URL redirects. CVE-2014-1277 : Stefan Esser
● Kernel Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A local user may be able to cause an unexpected system termination or arbitrary code execution in the kernel Description: An out of bounds memory access issue existed in the ARM ptmx_get_ioctl function. This issue was addressed through improved bounds checking. CVE-2014-1278 : evad3rs
● Office Viewer Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Opening a maliciously crafted Microsoft Word document may lead to an unexpected application termination or arbitrary code execution Description: A double free issue existed in the handling of Microsoft Word documents. This issue was addressed through improved memory management. CVE-2014-1252 : Felix Groebert of the Google Security Team
● Photos Backend Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Deleted images may still appear in the Photos app underneath transparent images Description: Deleting an image from the asset library did not delete cached versions of the image. This issue was addressed through improved cache management. CVE-2014-1281 : Walter Hoelblinger of Hoelblinger.com, Morgan Adams, Tom Pennington
● Profiles Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A configuration profile may be hidden from the user Description: A configuration profile with a long name could be loaded onto the device but was not displayed in the profile UI. The issue was addressed through improved handling of profile names. CVE-2014-1282 : Assaf Hefetz, Yair Amit and Adi Sharabani of Skycure
● Safari Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: User credentials may be disclosed to an unexpected site via autofill Description: Safari may have autofilled user names and passwords into a subframe from a different domain than the main frame. This issue was addressed through improved origin tracking. CVE-2013-5227 : Niklas Malmgren of Klarna AB
● Settings - Accounts Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A person with physical access to the device may be able to disable Find My iPhone without entering an iCloud password Description: A state management issue existed in the handling of the Find My iPhone state. This issue was addressed through improved handling of Find My iPhone state. CVE-2014-1284
● Springboard Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A person with physical access to the device may be able to see the home screen of the device even if the device has not been activated Description: An unexpected application termination during activation could cause the phone to show the home screen. The issue was addressed through improved error handling during activation. CVE-2014-1285 : Roboboi99
● SpringBoard Lock Screen Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A remote attacker may be able to cause the lock screen to become unresponsive Description: A state management issue existed in the lock screen. This issue was addressed through improved state management. CVE-2014-1286 : Bogdan Alecu of M-sec.net
● TelephonyUI Framework Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A webpage could trigger a FaceTime audio call without user interaction Description: Safari did not consult the user before launching facetime-audio:// URLs. This issue was addressed with the addition of a confirmation prompt. CVE-2013-6835 : Guillaume Ross
● USB Host Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A person with physical access to the device may be able to cause arbitrary code execution in kernel mode Description: A memory corruption issue existed in the handling of USB messages. This issue was addressed through additional validation of USB messages. CVE-2014-1287 : Andy Davis of NCC Group
● Video Driver Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Playing a maliciously crafted video could lead to the device becoming unresponsive Description: A null dereference issue existed in the handling of MPEG-4 encoded files. This issue was addressed through improved memory handling. CVE-2014-1280 : rg0rd
● WebKit Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-2013-2909 : Atte Kettunen of OUSPG CVE-2013-2926 : cloudfuzzer CVE-2013-2928 : Google Chrome Security Team CVE-2013-5196 : Google Chrome Security Team CVE-2013-5197 : Google Chrome Security Team CVE-2013-5198 : Apple CVE-2013-5199 : Apple CVE-2013-5225 : Google Chrome Security Team CVE-2013-5228 : Keen Team (@K33nTeam) working with HP's Zero Day Initiative CVE-2013-6625 : cloudfuzzer CVE-2013-6635 : cloudfuzzer CVE-2014-1269 : Apple CVE-2014-1270 : Apple CVE-2014-1289 : Apple CVE-2014-1290 : ant4g0nist (SegFault) working with HP's Zero Day Initiative, Google Chrome Security Team CVE-2014-1291 : Google Chrome Security Team CVE-2014-1292 : Google Chrome Security Team CVE-2014-1293 : Google Chrome Security Team CVE-2014-1294 : Google Chrome Security Team -----
Would you like to be notified when someone replies or adds a new comment?
Yes (All Threads)
Yes (This Thread Only)
No
Notifications
Would you like to be notified when we post a new Apple news article or tutorial?
Yes
No
Comments (30)
Comments are closed for this article.
0
Mimmi Andersson - June 18, 2014 at 5:00am
Iphone 5 Jailbreake 7.1
0
Nitro Junkie - March 12, 2014 at 1:36pm
So what you're really trying to say is that you are banging the maid and trying not to get caught by your wife? Your conscience eating you up much? And to be honest with you, in this day in age anyone can find out whatever they want about you. Government or not.
0
Since2002 - March 11, 2014 at 4:52pm
Oh Man, we are living in a different world now. A world where hackers are collaborating with the product manufacturer and in return the company giving a public shout out to the hacker.
0
Mike Power - March 11, 2014 at 2:18pm
Wow, that's a start, now lets wait and see if the thanks them for all the innovation they've stolen from Evad3rs and come out clean about all the others they've stolen from. AppleCrapple
0
Wow13 - March 11, 2014 at 11:47am
So, apple tries to hide the self-made-intentional-NSA-backdoors by calling them bugs :) nice try apple...
0
gamerscul9870 - March 12, 2014 at 1:41pm
And the Oscar for most clueless dick in the universe goes to: wow!
0
gamerscul9870 - March 12, 2014 at 3:00pm
Galaxy and their black holes, that's how it gets the name, look how much sense it all makes. lolol
0
jordan.belfort - March 11, 2014 at 4:54am
obviously... you guys know nothing about software development.
0
gamerscul9870 - March 11, 2014 at 5:13am
Neither do you.
0
Mike Power - March 11, 2014 at 12:30am
and this is supposed to be the best ios, what a joke.
0
gamerscul9870 - March 11, 2014 at 1:25am
You're the joke.
0
odedoo1 - March 11, 2014 at 2:51am
Why is there always someone that have to say something bad about Apple? go play with your Android if it fits you I don't care, there is nothing wrong with it, just not for me!
0
Wow13 - March 11, 2014 at 11:43am
Because there is always something bad to say about apple. Its their fault
0
sam wikwiki - March 10, 2014 at 11:41pm
good to know that why i dont jailbreak my iphone, just my ipad
0
Steve Jobs - March 10, 2014 at 11:12pm
Lovely Boys !!
0
shar - March 10, 2014 at 11:07pm
that's actually kind of scary, to know my phone has these many holes (now public!!!) to be taken advantage of, if I don't upgrade in order to keep my jailbreak.
0
odedoo1 - March 11, 2014 at 2:48am
there will always be that many holes and what do you think Android is? it's one big hole all together it's an open system so I don't see what the big deal is, it's not like anybody cares.
0
JesterJarett - March 10, 2014 at 10:29pm
Shut it, Waley! The flippin' firmware was just released today. Give it some time!
0
Waley Eweda - March 12, 2014 at 11:17am
I amjust asking when only. i can wait whole year
0
Majd - March 10, 2014 at 10:28pm
What does it mean ? English please :p
0
Waley Eweda - March 10, 2014 at 10:28pm
When jailbreak 7.1 Will Be Out??
0
odedoo1 - March 10, 2014 at 10:34pm
never
0
gamerscul9870 - March 10, 2014 at 11:05pm
Don't me ismael unless it's you hiding identity.
0
gamerscul9870 - March 10, 2014 at 11:05pm
Be*
0
Nitro Junkie - March 10, 2014 at 11:39pm
That's not Ismael Santos. He didn't type in all caps and use periods after every word.
0
gamerscul9870 - March 11, 2014 at 2:59am
Yet he always asks when it's coming out. That's also why I pointed out "hidden" identity, may not be caps and all, but still asking those questions.
0
Waley Eweda - March 11, 2014 at 7:12am
O.o Did I Say Something Wrong?
0
farpthor - March 11, 2014 at 2:15pm
A new Jb would be really good for people using older devices, like iPhone4. The performance of iOS 7 on those devices has dropped, it's really sluggish...
0
iDontKnow - March 12, 2014 at 1:16pm
They forgot to thank them for JB the device. Owner should have control on their device and not them controling you. Without JB you will lost the flexibility.
0
Nitro Junkie - March 12, 2014 at 2:22pm
And a jail brake is going to make older devices faster. Lol. Please. If anything jail braking makes performance slower and has a lot of lag. This last iOS update actually made performance on older iPhone 4's a lot faster.