The attack takes advantage of a vulnerability in the phoneâs short messaging service, or SMS, feature, allowing an outside party into the phoneâs root access without the ownerâs knowledge. Security researcher Charles Miller, co-author of The Mac Hackerâs Handbook, announced his discovery Thursday at the SyScan Conference in Singapore, according to Computerworld.
Apple plans to have the fix released later this month, before Miller gives his scheduled speech at the Black Hat Technical Security Conference in Los Angeles. At the July 25-30 conference, Miller will be joined by Colin Mulliner for a talk entitled âFuzzing the Phone in Your Phone,â which will show attendees how to discover vulnerabilities in a variety of smartphones.
Miller has not specifically detailed how the SMS exploit is done, citing an agreement with Apple. But he will discuss the attack in length at the Black Hat conference.
The exploit takes advantage of the fact that SMS can send binary code to an iPhone. That code is automatically processed without user interaction, and can be compiled from multiple messages, allowing larger programs to be sent to a phone.
For a widely-adopted platform, Appleâs iPhone has had remarkably little in the way of discovered vulnerabilities in its short history. In 2007, a security firm â including Miller â notified Apple of the phoneâs first security flaw, soon after the hardware had been released. It was subsequently fixed by Apple.
Miller said that the iPhoneâs stripped-down version of OS X makes it more secure than the full-fledged operating system. And because it lacks support for Adobe Flash and Java, isolates individual applications from one another, and only allows software that has been digitally signed by Apple, it is less likely to have security flaws than a full-form computer.
23 Comments
First!
Oh, I beg to differ greatly and I have a link to prove that 46 vulnerabilities were fixed in iPhone 3.0.
I'll be right back with a link.
Apple has released version 3.0 of its iPhone mobile operating system. The update not only includes several new features, but also fixes 46 security vulnerabilities. Version 3.0 of the iPhone OS fixes 23 vulnerabilities in WebKit and Safari alone. According to Apple, many of the problems could have lead to the execution of arbitrary code when visiting a maliciously crafted website. Other vulnerabilities include unexpected application termination or arbitrary code execution when opening a maliciously crafted PDF document or image file and possible disclosure of sensitive information when connecting to a malicious Exchange server.
http://www.h-online.com/security/iPh...--/news/113563http://arstechnica.com/apple/news/20...rabilities.arshttp://blogs.zdnet.com/security/?p=3644
Also Apple can replace the iPhone glass at retail stores. It uses a suction type device to pull the old one off.
First!
why do you come to the forums just to say that?
why do you come to the forums just to say that?
I think I know of him from MacRumors and he seems to have self-esteem issues.
What's *not* stated in Miller's description of the vulnerability is that the other apps are sandboxed anyway, so even if the hacker sends an SMS with (presumably a picture attachment), gets the code to run and gets root access, all they have access to is the low level system stuff and the automatic messages. It's hard to tell until he fully describes it, but it doesn't seem like this would give anyone access to your data, just some low level phone hardware items.