iOS 8 brings a lot of security updates

You must have heard of the brand new version of iOS which was release yesterday: iOS v8.

ios8

While the media is still considering and reconsidering their recommendations for each device on whether or not you should upgrade, here are my reasons to update my iPad 3rd generation. I don’t have an iPhone anymore, I am an Android user now with my great Galaxy Note 3.

Apple published, as usual, the security release notes in their KB http://support.apple.com/kb/HT6441.

The list of vulnerabilities fixed is too long to describe it here, but here is a summary:

– a series of kernel flaws,

– several WebKit bugs

– vulnerabilities that allowed a user to install apps outside of the App Store

Most critical: the way that the OS implemented 802.1x. For those who don’t know what that is, 802.1x is the protocol behind any wireless network. In some cases, the flaw could enable an attacker to steal a user’s WiFi credentials.

Here is what Apple says:

Impact: An attacker can obtain WiFi credentials

Description: An attacker could have impersonated a WiFi access point, offered to authenticate with LEAP, broken the MS-CHAPv1 hash, and used the derived credentials to authenticate to the intended access point even if that access point supported stronger authentication methods. This issue was addressed by disabling LEAP by default.

Other interesting vulnerabilities were related to apps. I might be wrong here, but these two vulnerabilities would allow someone to install apps from outside the App Store without rooting the device.

Impact: A local attacker may be able to escalate privileges and install unverified applications

Another noticeable bug fixed was in iMessage. Attachments may persist after the parent iMessage or MMS is deleted. So, you send or receive a photo via iMessage, potentially private, and you delete the message. Because of this bug, the photo was not deleted.

 

Apple also fixed vulnerabilities in both Safari and WebKit. The most important ones were:

Impact: An attacker with a privileged network position may intercept user credentials

Saved passwords were autofilled on http sites, on https sites with broken trust, and in iframes. This issue was addressed by restricting password autofill to the main frame of https sites with valid certificate chains

and the other one:

Impact: User credentials may be disclosed to an unintended site via autofill

Description: Safari may have autofilled user names and passwords into a subframe from a different domain than the main frame. This issue was addressed through improved origin

 

 

Conclusion:

If your device accepts the update and the rumors are that your device will continue to function decently after the update, then DO apply the update.

 

 


© Copyright 2014 Sorin Mustaca, All rights Reserved. Written For: Sorin Mustaca on Cybersecurity

Check www.mustaca.com for the IT Consulting services I offer.
Visit www.itsecuritynews.info for latest security news in English
Besuchen Sie http://de.itsecuritynews.info für IT Sicherheits News auf Deutsch

About the Author

Sorin Mustaca

Sorin Mustaca, (ISC)2 CSSLP, CompTIA Security+ and Project+, is working since year 2000 in the IT Security industry and worked between 2003-2014 for Avira as Product Manager for the known products used by over 100 million users world-wide. Today he is an independent IT Security Consultant focusing on Cybersecurity, secure software development and security for IoT and Automotive. He is also running his personal blog Sorin Mustaca on Cybersecurity and is the author of the free eBook Improve your security .

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close