Risk
5/8/2012
12:19 PM
Connect Directly
RSS
E-Mail
50%
50%

Apple Fixes Serious iOS Security Bugs

Apple iOS version 5.1.1 patches three big iPhone and iPad vulnerabilities. But OS X Lion update results in FileVault passwords being stored in plaintext.

Apple released iOS version 5.1.1 Monday and urged users to immediately update.

While the update includes several refinements--including better cellular network switching on the new iPad and improved HDR photography reliability--it also patches three serious vulnerabilities that could be exploited by attackers to potentially execute arbitrary code on a device.

The updated version of iOS will work on iPhone 3GS, iPhone 4, iPhone 4S, iPod Touch (3rd generation and later), as well as the iPad, iPad 2, and new iPad.

The first vulnerability patched in iOS 5.1.1 involves Safari. It would allow a malicious website "to spoof the address in the location bar," so users could be surfing a fake site that appeared to be real, according to an overview of the security issues from Apple. The company said it's addressed the issue "through improved URL handling," and that the bug isn't present in Mac OS X versions of Safari.

[ Online anonymity has both pros and cons. Read more at Has Anonymous Ruined Online Anonymity?. ]

The other two vulnerabilities are in the WebKit open source Web browser engine. The first WebKit bug, which was discovered by the Google Chrome Security Team, would allow an attacker to create a malicious website that launches attacks that unexpectedly terminate applications or even execute arbitrary code.

The second WebKit bug, meanwhile, was divulged earlier this year by veteran Chrome bug-hunter Sergey Glazunov during Google's Pwnium contest. Like Safari, the Chrome browser is also based on WebKit.

Anyone with a jailbroken device can also update to iOS 5.1.1, provided their device uses an A4 chip. "That excludes newer devices such as the iPhone 4S, the iPad 2, and the iPad which came after the iPad 2," said Paul Ducklin, head of technology for Sophos in the Asia Pacific region, in a blog post. "As with iOS 5.1, it's a tethered jailbreak. That means you need to connect your device to your computer and use the jailbreaking tool when you reboot."

Apple has been furiously updating its operating systems recently, most notably to patch OS X users against the Flashback malware, or any other malicious code that might like to target the underlying Java vulnerability. But not all of the patches have been going smoothly.

For example, the latest OS X Lion security update (10.7.3) has a bug that stores as plaintext the passwords for the optional Apple FileVault system that encrypts Mac user's home folders. The bug appears to affect only users who upgraded from OS X Lion to Snow Leopard and who retained FileVault instead of upgrading to FileVault 2, which encrypts the entire hard disc.

News of the bug, which appears to date from February, first appeared Friday when David Emery, a consultant at DIE Consulting, detailed the flaw to a cryptography email list. "Someone, for some unknown reason, turned on a debug switch (DEBUGLOG) in the current released version of MacOS Lion 10.7.3 that causes the authorization host process's HomeDirMounter DIHLFVMount to log in *PLAIN TEXT* in a system-wide logfile readable by anyone with root or admin access the login password of the user of an encrypted home directory tree ('legacy Filevault'). The log in question is kept by default for several weeks," he wrote.

But these plaintext passwords can persist much longer if they end up being saved to external media as part of automated Apple OS X Time Machine backups. "Vulnerable users who do not encrypt their Time Machine backups risk replicating this log file to their backups, which could mean long-term storage of their unencrypted password," said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post.

All 10.7.3 users should change their FileVault passwords and be sure to not reuse their passwords elsewhere, he said. Furthermore, even after Apple issues a fix, any FileVault users on OS X Lion should assume that their previous password remains compromised, since it may continue to be stored in plaintext form in Time Machine.

At a time when cybercrime has never been more prolific and sophisticated, budgets are being cut. In response, IT is taking a hard look using third-party services--outsourcing--to meet security challenges. Our Making The Security Outsourcing Decision report outlines the various security outsourcing options available. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2003-1598
Published: 2014-10-01
SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable.

CVE-2011-4624
Published: 2014-10-01
Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.

CVE-2012-0811
Published: 2014-10-01
Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files gene...

CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Chris Hadnagy, who hosts the annual Social Engineering Capture the Flag Contest at DEF CON, will discuss the latest trends attackers are using.