Apple working to fix unreleased iPhone SMS exploit
AppleInsider may earn an affiliate commission on purchases made through links on our site.
The attack takes advantage of a vulnerability in the phoneâs short messaging service, or SMS, feature, allowing an outside party into the phoneâs root access without the ownerâs knowledge. Security researcher Charles Miller, co-author of The Mac Hackerâs Handbook, announced his discovery Thursday at the SyScan Conference in Singapore, according to Computerworld.
Apple plans to have the fix released later this month, before Miller gives his scheduled speech at the Black Hat Technical Security Conference in Los Angeles. At the July 25-30 conference, Miller will be joined by Colin Mulliner for a talk entitled âFuzzing the Phone in Your Phone,â which will show attendees how to discover vulnerabilities in a variety of smartphones.
Miller has not specifically detailed how the SMS exploit is done, citing an agreement with Apple. But he will discuss the attack in length at the Black Hat conference.
The exploit takes advantage of the fact that SMS can send binary code to an iPhone. That code is automatically processed without user interaction, and can be compiled from multiple messages, allowing larger programs to be sent to a phone.
For a widely-adopted platform, Appleâs iPhone has had remarkably little in the way of discovered vulnerabilities in its short history. In 2007, a security firm â including Miller â notified Apple of the phoneâs first security flaw, soon after the hardware had been released. It was subsequently fixed by Apple.
Miller said that the iPhoneâs stripped-down version of OS X makes it more secure than the full-fledged operating system. And because it lacks support for Adobe Flash and Java, isolates individual applications from one another, and only allows software that has been digitally signed by Apple, it is less likely to have security flaws than a full-form computer.