Welcome, Guest. Please login or register.
June 27, 2025, 04:24:18 PM

Login with username, password and session length

Search:     Advanced search
we're back, baby
*
Home Help Search Login Register
f13.net  |  f13.net General Forums  |  General Discussion  |  Topic: iPhone SMS exploit to be revealed at Black Hat on 7/30 0 Members and 1 Guest are viewing this topic.
Pages: 1 [2] Go Down Print
Author Topic: iPhone SMS exploit to be revealed at Black Hat on 7/30  (Read 8402 times)
Oban
Terracotta Army
Posts: 4662


Reply #35 on: July 31, 2009, 01:30:27 PM

Microsoft?

Palin 2012 : Let's go out with a bang!
Oban
Terracotta Army
Posts: 4662


Reply #36 on: July 31, 2009, 01:52:29 PM

Quote
Apple rep Tom Neumayr:

    We appreciate the information provided to us about SMS vulnerabilities which affect several mobile phone platforms. This morning, less than 24 hours after a demonstration of this exploit, we've issued a free software update that eliminates the vulnerability from the iPhone. Contrary to what's been reported, no one has been able to take control of the iPhone to gain access to personal information using this exploit.


I guess I should plug my iPhone in.

Palin 2012 : Let's go out with a bang!
Righ
Terracotta Army
Posts: 6542

Teaching the world Google-fu one broken dream at a time.


Reply #37 on: August 01, 2009, 09:38:58 AM

I can't side with Apple et al. here. Hire some more security analysts yourselves instead of hoping that academics will find the flaws for you and then fail to publish so as to allow you to hold off until the next product cycle. More crappy business cost cutting I'm afraid.

This is interesting stuff for those of us not in the know. Are there any large documented cases of a company actually waiting for the next product life cycle to implement a solution to a large security flaw?

I'd have to dig around for actual cases, but yes, before high-profile publication of exploits was common many companies were well aware of security problems for which code existed in the wild that exploited them and chose just to chug along towards the next iteration of their product rather than fix them. I'm old enough to remember when technical staff at companies would be upfront with their customers that there would not be a fix before the next major software release. Don't forget that before around 1988 (when Robert Morris' worm demonstrated its value) almost nobody outside intelligence and academic communities cared about computer security at all. It's a young discipline.

The camera adds a thousand barrels. - Steven Colbert
Quinton
Terracotta Army
Posts: 3332

is saving up his raid points for a fancy board title


Reply #38 on: August 01, 2009, 12:56:58 PM

That might fix the buffer overflow but that doesn't mean there aren't other things that would need to fixed to properly protect against this attack. E.g. it's possible that just fixing the buffer overflow still makes the phone susceptible to Denial of Service attacks by the onslaught of rapid fire SMS control messages which is effectively what a similar attack did to Android (it would disable cell service but you couldn't take control of the phone) before Google fixed it (I'm assuming this is the fix Quinton referred to above).

No, I was talking about a possible remote exploit in the G1 wifi driver that was fixed before G1 launched, which was found by our security team.  Android was affected by the SMS issue being discussed here, but it resulted in the telephony process getting stuck (SMS parser got confused and wedged), requiring a reboot.  No remote code execution, but still annoying.

We were notified around the same time Apple was, I believe, and we deployed an over the air update to fix devices in the field prior to the public disclosure of this attack.

Security is hard!
Sheepherder
Terracotta Army
Posts: 5192


Reply #39 on: August 02, 2009, 09:39:18 AM

This is interesting stuff for those of us not in the know. Are there any large documented cases of a company actually waiting for the next product life cycle to implement a solution to a large security flaw?

That IE8 vulnerability that is stickied at the top of the page?  First seen actively being exploited on December 2008.  Of course, it took Apple six months longer to fix a vulnerability in JavaScript than other browser vendors.

Also, it's not even that the Black Hat community are such tremendous dicks that they can't be asked to delay the disclosure of an exploit (Don't bother watching all of it, they don't cover a lot of new ground).
Pages: 1 [2] Go Up Print 
f13.net  |  f13.net General Forums  |  General Discussion  |  Topic: iPhone SMS exploit to be revealed at Black Hat on 7/30  
Jump to:  

Powered by SMF 1.1.10 | SMF © 2006-2009, Simple Machines LLC