Risk
5/8/2012
12:19 PM
50%
50%

Apple Fixes Serious iOS Security Bugs

Apple iOS version 5.1.1 patches three big iPhone and iPad vulnerabilities. But OS X Lion update results in FileVault passwords being stored in plaintext.

Apple released iOS version 5.1.1 Monday and urged users to immediately update.

While the update includes several refinements--including better cellular network switching on the new iPad and improved HDR photography reliability--it also patches three serious vulnerabilities that could be exploited by attackers to potentially execute arbitrary code on a device.

The updated version of iOS will work on iPhone 3GS, iPhone 4, iPhone 4S, iPod Touch (3rd generation and later), as well as the iPad, iPad 2, and new iPad.

The first vulnerability patched in iOS 5.1.1 involves Safari. It would allow a malicious website "to spoof the address in the location bar," so users could be surfing a fake site that appeared to be real, according to an overview of the security issues from Apple. The company said it's addressed the issue "through improved URL handling," and that the bug isn't present in Mac OS X versions of Safari.

[ Online anonymity has both pros and cons. Read more at Has Anonymous Ruined Online Anonymity?. ]

The other two vulnerabilities are in the WebKit open source Web browser engine. The first WebKit bug, which was discovered by the Google Chrome Security Team, would allow an attacker to create a malicious website that launches attacks that unexpectedly terminate applications or even execute arbitrary code.

The second WebKit bug, meanwhile, was divulged earlier this year by veteran Chrome bug-hunter Sergey Glazunov during Google's Pwnium contest. Like Safari, the Chrome browser is also based on WebKit.

Anyone with a jailbroken device can also update to iOS 5.1.1, provided their device uses an A4 chip. "That excludes newer devices such as the iPhone 4S, the iPad 2, and the iPad which came after the iPad 2," said Paul Ducklin, head of technology for Sophos in the Asia Pacific region, in a blog post. "As with iOS 5.1, it's a tethered jailbreak. That means you need to connect your device to your computer and use the jailbreaking tool when you reboot."

Apple has been furiously updating its operating systems recently, most notably to patch OS X users against the Flashback malware, or any other malicious code that might like to target the underlying Java vulnerability. But not all of the patches have been going smoothly.

For example, the latest OS X Lion security update (10.7.3) has a bug that stores as plaintext the passwords for the optional Apple FileVault system that encrypts Mac user's home folders. The bug appears to affect only users who upgraded from OS X Lion to Snow Leopard and who retained FileVault instead of upgrading to FileVault 2, which encrypts the entire hard disc.

News of the bug, which appears to date from February, first appeared Friday when David Emery, a consultant at DIE Consulting, detailed the flaw to a cryptography email list. "Someone, for some unknown reason, turned on a debug switch (DEBUGLOG) in the current released version of MacOS Lion 10.7.3 that causes the authorization host process's HomeDirMounter DIHLFVMount to log in *PLAIN TEXT* in a system-wide logfile readable by anyone with root or admin access the login password of the user of an encrypted home directory tree ('legacy Filevault'). The log in question is kept by default for several weeks," he wrote.

But these plaintext passwords can persist much longer if they end up being saved to external media as part of automated Apple OS X Time Machine backups. "Vulnerable users who do not encrypt their Time Machine backups risk replicating this log file to their backups, which could mean long-term storage of their unencrypted password," said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post.

All 10.7.3 users should change their FileVault passwords and be sure to not reuse their passwords elsewhere, he said. Furthermore, even after Apple issues a fix, any FileVault users on OS X Lion should assume that their previous password remains compromised, since it may continue to be stored in plaintext form in Time Machine.

At a time when cybercrime has never been more prolific and sophisticated, budgets are being cut. In response, IT is taking a hard look using third-party services--outsourcing--to meet security challenges. Our Making The Security Outsourcing Decision report outlines the various security outsourcing options available. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8891
Published: 2015-03-06
Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to escape the Java sandbox and execute arbitrary code via unspecified vectors...

CVE-2014-8892
Published: 2015-03-06
Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to bypass intended access permissions and obtain sensitive information via un...

CVE-2015-1170
Published: 2015-03-06
The NVIDIA Display Driver R304 before 309.08, R340 before 341.44, R343 before 345.20, and R346 before 347.52 does not properly validate local client impersonation levels when performing a "kernel administrator check," which allows local users to gain administrator privileges via unspecified API call...

CVE-2015-1637
Published: 2015-03-06
Schannel (aka Secure Channel) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict TLS state transitions, which makes it easier for r...

CVE-2014-2130
Published: 2015-03-05
Cisco Secure Access Control Server (ACS) provides an unintentional administration web interface based on Apache Tomcat, which allows remote authenticated users to modify application files and configuration files, and consequently execute arbitrary code, by leveraging administrative privileges, aka B...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.