Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
IOS Security Apple

Apple Patches Stagefright-Like Bug In IOS (fortune.com) 23

Reader Trailrunner7 writes: Apple has fixed a series of high-risk vulnerabilities in iOS, including three that could lead to remote code execution, with the release of iOS 9.3.3. One of those code-execution vulnerabilities lies in the way that iOS handles TIFF files in various applications (Alternate source: Fortune ). Researchers at Cisco's TALOS team, who discovered the flaw, said that the vulnerability has a lot of potential for exploitation. "This vulnerability is especially concerning as it can be triggered in any application that makes use of the Apple Image I/O API when rendering tiled TIFF images. This means that an attacker could deliver a payload that successfully exploits this vulnerability using a wide range of potential attack vectors including iMessages, malicious web pages, MMS messages, or other malicious file attachments opened by any application that makes use of the Apple Image I/O API for rendering these types of files," Cisco TALOS said in a blog post.
This discussion has been archived. No new comments can be posted.

Apple Patches Stagefright-Like Bug In IOS

Comments Filter:
  • by rsmith-mac ( 639075 ) on Thursday July 21, 2016 @07:47PM (#52558093)

    Perhaps I've just missed this in the reports, but is there any analysis on how this is impacted by sandboxing?

    Apple tends to keep things pretty locked down and isolated, and while Stagefright was a Go Directly to Root kind of exploit, I'm curious whether this has the same risk. Can a bad TIFF file delivered via iMessage actually break out of iMessage? "Ultimately, an attack could give a hacker access to portions of a computerâ(TM)s memory" is not very descriptive here.

    Side note: why the heck is anyone still supporting TIFF as a built-in image format. The TIFF standard is so complex that it has been the source of an innumerable number of security exploits over the years. It's a very risky format to support for exactly this reason.

    • by AHuxley ( 892839 )
      It would be interesting thought for DRM and an OS. Remove the DRM and the quality "image" with code is used in the unprotected copy as its part of the new free file. The free copy is then opened and OS and code access to the wider OS is granted to phone home.

      As for why, maybe the OS likes a format thats well understood to ensure a set look and feel over desktop, apps, phones.
      A more lossy format might change over different hardware and software. With a push for publish once from any device, some image
    • by AmiMoJo ( 196126 )

      Why isn't this getting more coverage? When it's Android everyone shits themselves, even though the danger isn't really that great. When it's Apple, it's largely ignored even though the risk seems to be far greater.

      • Why isn't this getting more coverage? When it's Android everyone shits themselves, even though the danger isn't really that great. When it's Apple, it's largely ignored even though the risk seems to be far greater.

        Because it was just reported. And has already been fixed. And everybody can download the patch now and not only in a couple of months, if at all. And isn't used in the wild. And still gets wide press coverage despite your claim.

        You can start complaining if after 2 months it becomes clear that the fix (which hasn't reached most devices yet) only fixes some of the problems.

        • by AmiMoJo ( 196126 )

          Google fixed it right away too, and then pushed the patch out via Play to everyone, and added detection if the exploit to the built in scanner for non-Play apps.

          • Google fixed it right away too, and then pushed the patch out via Play to everyone, and added detection if the exploit to the built in scanner for non-Play apps.

            Actually, they had already fixed it two months before, but waited to tell the public until at least some devices where actually fixed. And then they fixed a very similar bug again two months later. And then most devices still didn't even have the first patch. Don't try to kid me, stick to your own illusions.

          • by trparky ( 846769 )
            I don't understand how Google could have fixed this. You say that it was pushed via Google Play but how? It's a system-level binary, Google can't touch that; only an update from your particular Android OEM can fix this via an OTA update.

            Oh oh, Google can push this or that via the Google Play services. WRONG! Google can update their own stuff, yes, I'm not denying that but if it's a system-level binary (like Stagefright) or kernel-related Google can't do shit about it! Meanwhile you have to sit and wait fo

Any sufficiently advanced technology is indistinguishable from magic. -- Arthur C. Clarke

Working...