iPhone update 1.0.1 released: security fixes

iPhone update 1.0.1 released: security fixes

iPhone update 1.0.1 is now available through iTunes. The new release patches several security flaws related to Safari, WebKit and WebCore.

You can obtain the update via the "Check for Updates" button or menu item in iTunes To check that the iPhone has been properly updated, tap "Settings" then "General" then "About." The version after applying this update will be "1.0.1 (1C25)".

Problems after updating? Please let us know

Specific security enhancements include:

Safari
  • Visiting a malicious website may allow cross-site scripting Safari's security model prevents JavaScript in remote web pages from modifying pages outside of their domain. A race condition in page updating combined with HTTP redirection may allow JavaScript from one page to modify a redirected page. This could allow cookies and pages to be read or arbitrarily modified. This update addresses the issue by correcting access control to window properties. Credit to Lawrence Lai, Stan Switzer, and Ed Rowe of Adobe Systems, Inc. for reporting this issue.
  • Viewing a maliciously crafted web page may lead to arbitrary code execution Heap buffer overflows exist in the Perl Compatible Regular Expressions (PCRE) library used by the JavaScript engine in Safari. By enticing a user to visit a maliciously crafted web page, an attacker may trigger the issue, which may lead to arbitrary code execution. This update addresses the issue by performing additional validation of JavaScript regular expressions. Credit to Charlie Miller and Jake Honoroff of Independent Security Evaluators for reporting these issues.

WebCore

  • An HTTP injection issue exists in XMLHttpRequest when serializing headers into an HTTP request By enticing a user to visit a maliciously crafted web page, an attacker could trigger a cross-site scripting issue. This update addresses the issue by performing additional validation of header parameters. Credit to Richard Moore of Westpoint Ltd. for reporting this issue.

WebKit

  • Look-alike characters in a URL could be used to masquerade a website The International Domain Name (IDN) support and Unicode fonts embedded in Safari could be used to create a URL which contains look-alike characters. These could be used in a malicious web site to direct the user to a spoofed site that visually appears to be a legitimate domain. This update addresses the issue by through an improved domain name validity check.
  • Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution An invalid type conversion when rendering frame sets could lead to memory corruption. Visiting a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution. Credit to Rhys Kidd of Westnet for reporting this issue.

For more information on updating and restoring iPhone software, see Knowledge Base article #305744.

 

Join the discussion

Conversation powered by Livefyre

Show Comments Hide Comments
Latest Galleries from CNET
Uber's tumultuous ups and downs in 2014 (pictures)
The best and worst quotes of 2014 (pictures)
A roomy range from LG (pictures)
This plain GE range has all of the essentials (pictures)
Sony's 'Interview' heard 'round the world (pictures)
Google Lunar XPrize: Testing Astrobotic's rover on the rocks (pictures)