Apple Credits Evad3rs in iOS 7.1 Security Announcement

Apple Credits Evad3rs in iOS 7.1 Security Announcement

Posted by · 74412 views · Translate
Apple security announcement for iOS 7.1 credits the evad3rs, i0n1c, and others with finding the vulnerabilities closed by the firmware update.

The evad3rs are credited for finding Backup, Crash Reporting, dyld, and kernel vulnerabilities.

You can all the security updates listed below:

-----
Backup
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A maliciously crafted backup can alter the filesystem
Description: A symbolic link in a backup would be restored, allowing subsequent operations during the restore to write to the rest of the filesystem. This issue was addressed by checking for symbolic links during the restore process.
CVE-2013-5133 : evad3rs

Certificate Trust Policy
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: Root certificates have been updated
Description: Several certificates were added to or removed from the list of system roots.

Configuration Profiles
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: Profile expiration dates were not honored
Description: Expiration dates of mobile configuration profiles were not evaluated correctly. The issue was resolved through improved handling of configuration profiles.
CVE-2014-1267

CoreCapture
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A malicious application can cause an unexpected system termination
Description: A reachable assertion issue existed in CoreCapture's handling of IOKit API calls. The issue was addressed through additional validation of input from IOKit.
CVE-2014-1271 : Filippo Bigarella

Crash Reporting
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A local user may be able to change permissions on arbitrary files
Description: CrashHouseKeeping followed symbolic links while changing permissions on files. This issue was addressed by not following symbolic links when changing permissions on files.
CVE-2014-1272 : evad3rs

dyld
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: Code signing requirements may be bypassed
Description: Text relocation instructions in dynamic libraries may be loaded by dyld without code signature validation. This issue was addressed by ignoring text relocation instructions.
CVE-2014-1273 : evad3rs

FaceTime
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A person with physical access to the device may be able to access FaceTime contacts from the lock screen
Description: FaceTime contacts on a locked device could be exposed by making a failed FaceTime call from the lock screen. This issue was addressed through improved handling of FaceTime calls.
CVE-2014-1274

ImageIO
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in the handling of JPEG2000 images in PDF files. This issue was addressed through improved bounds checking.
CVE-2014-1275 : Felix Groebert of the Google Security Team

ImageIO
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: Viewing a maliciously crafted TIFF file may lead to an unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in libtiff's handling of TIFF images. This issue was addressed through additional validation of TIFF images.
CVE-2012-2088

ImageIO
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: Viewing a maliciously crafted JPEG file may lead to the disclosure of memory contents
Description: An uninitialized memory access issue existed in libjpeg's handling of JPEG markers, resulting in the disclosure of memory contents. This issue was addressed through additional validation of JPEG files.
CVE-2013-6629 : Michal Zalewski

IOKit HID Event
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A malicious application may monitor on user actions in other apps
Description: An interface in IOKit framework allowed malicious apps to monitor on user actions in other apps. This issue was addressed through improved access control policies in the framework.
CVE-2014-1276 : Min Zheng, Hui Xue, and Dr. Tao (Lenx) Wei of FireEye

iTunes Store
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A man-in-the-middle attacker may entice a user into downloading a malicious app via Enterprise App Download
Description: An attacker with a privileged network position could spoof network communications to entice a user into downloading a malicious app. This issue was mitigated by using SSL and prompting the user during URL redirects.
CVE-2014-1277 : Stefan Esser

Kernel
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A local user may be able to cause an unexpected system termination or arbitrary code execution in the kernel
Description: An out of bounds memory access issue existed in the ARM ptmx_get_ioctl function. This issue was addressed through improved bounds checking.
CVE-2014-1278 : evad3rs

Office Viewer
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: Opening a maliciously crafted Microsoft Word document may lead to an unexpected application termination or arbitrary code execution
Description: A double free issue existed in the handling of Microsoft Word documents. This issue was addressed through improved memory management.
CVE-2014-1252 : Felix Groebert of the Google Security Team

Photos Backend
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: Deleted images may still appear in the Photos app underneath transparent images
Description: Deleting an image from the asset library did not delete cached versions of the image. This issue was addressed through improved cache management.
CVE-2014-1281 : Walter Hoelblinger of Hoelblinger.com, Morgan Adams, Tom Pennington

Profiles
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A configuration profile may be hidden from the user
Description: A configuration profile with a long name could be loaded onto the device but was not displayed in the profile UI. The issue was addressed through improved handling of profile names.
CVE-2014-1282 : Assaf Hefetz, Yair Amit and Adi Sharabani of Skycure

Safari
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: User credentials may be disclosed to an unexpected site via autofill
Description: Safari may have autofilled user names and passwords into a subframe from a different domain than the main frame. This issue was addressed through improved origin tracking.
CVE-2013-5227 : Niklas Malmgren of Klarna AB

Settings - Accounts
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A person with physical access to the device may be able to disable Find My iPhone without entering an iCloud password
Description: A state management issue existed in the handling of the Find My iPhone state. This issue was addressed through improved handling of Find My iPhone state.
CVE-2014-1284

Springboard
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A person with physical access to the device may be able to see the home screen of the device even if the device has not been activated
Description: An unexpected application termination during activation could cause the phone to show the home screen. The issue was addressed through improved error handling during activation.
CVE-2014-1285 : Roboboi99

SpringBoard Lock Screen
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A remote attacker may be able to cause the lock screen to become unresponsive
Description: A state management issue existed in the lock screen. This issue was addressed through improved state management.
CVE-2014-1286 : Bogdan Alecu of M-sec.net

TelephonyUI Framework
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A webpage could trigger a FaceTime audio call without user interaction
Description: Safari did not consult the user before launching facetime-audio:// URLs. This issue was addressed with the addition of a confirmation prompt.
CVE-2013-6835 : Guillaume Ross

USB Host
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A person with physical access to the device may be able to cause arbitrary code execution in kernel mode
Description: A memory corruption issue existed in the handling of USB messages. This issue was addressed through additional validation of USB messages.
CVE-2014-1287 : Andy Davis of NCC Group

Video Driver
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: Playing a maliciously crafted video could lead to the device becoming unresponsive
Description: A null dereference issue existed in the handling of MPEG-4 encoded files. This issue was addressed through improved memory handling.
CVE-2014-1280 : rg0rd

WebKit
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.
CVE-2013-2909 : Atte Kettunen of OUSPG
CVE-2013-2926 : cloudfuzzer
CVE-2013-2928 : Google Chrome Security Team
CVE-2013-5196 : Google Chrome Security Team
CVE-2013-5197 : Google Chrome Security Team
CVE-2013-5198 : Apple
CVE-2013-5199 : Apple
CVE-2013-5225 : Google Chrome Security Team
CVE-2013-5228 : Keen Team (@K33nTeam) working with HP's Zero Day Initiative
CVE-2013-6625 : cloudfuzzer
CVE-2013-6635 : cloudfuzzer
CVE-2014-1269 : Apple
CVE-2014-1270 : Apple
CVE-2014-1289 : Apple
CVE-2014-1290 : ant4g0nist (SegFault) working with HP's Zero Day Initiative, Google Chrome Security Team
CVE-2014-1291 : Google Chrome Security Team
CVE-2014-1292 : Google Chrome Security Team
CVE-2014-1293 : Google Chrome Security Team
CVE-2014-1294 : Google Chrome Security Team
-----

[via MuscleNerd]


Apple Credits Evad3rs in iOS 7.1 Security Announcement
Apple Junk - March 13, 2014 at 2:06am
Thanks to Evad3rs and Cydia that AppleJunk had made it this far to 7.1, Evad3rs are the one that have found all the vulnerabilities in the ios that they supposedly invented. So thanks to them and all the jailbreak community that apple had made it this far. So there to all, and I mean all Apple trolls, fanboys and GayBoys who are the real geniuses. Happy trollings...
Sam cum junk - March 13, 2014 at 2:11am
Nice prediction dumbass, now try and attempt to predict how less of a wannabe fandroid fanboy and samsheep you and your friends are. Moronic mind fcker, you haven't even used jailbreak to find out the real truth, plus the topic says "credits" like the end of a game or movie for example, what's that got to do with your mythical shit? Happy wannabe life you have ahead no matter how it ends.
Mimmi Andersson - June 18, 2014 at 5:00am
Iphone 5 Jailbreake 7.1
Since2002 - March 11, 2014 at 4:52pm
Oh Man, we are living in a different world now. A world where hackers are collaborating with the product manufacturer and in return the company giving a public shout out to the hacker.
Apple Junk - March 11, 2014 at 2:18pm
Wow, that's a start, now lets wait and see if the thanks them for all the innovation they've stolen from Evad3rs and come out clean about all the others they've stolen from. AppleCrapple
37 More Comments
Recent