iPhone

Security news roundup: November 13

Here's a collection of recent security vulnerabilities and alerts, which covers a new firmware update for the iPhone and iPod Touch, a new version of Miranda IM that fixes certain security issues, and a privilege escalation vulnerability in WinPcap.

Here's a collection of recent security vulnerabilities and alerts, which covers a new firmware update for the iPhone and iPod Touch, a new version of Miranda IM that fixes certain security issues, and a privilege escalation vulnerability in WinPcap.

  • Apple closes TIFF hole in iPhone

Apple has released firmware update 1.1.2 for the iPhone and iPod Touch to remedy flaws discovered in the TIFF library. Once the update has been installed from iTunes though, manipulated TIFF files will no longer execute third-party software on the iPhone.

It is highly recommended for users who surf the Internet with their iPhone to install update 1.1.2 as soon as possible to prevent criminals from exploiting their units via manipulated websites or emails.

You can read more about the issue from Apple's security advisory.

  • New versions of Miranda released

Two new versions of Miranda, version 0.7.2 and 0.7.3 have been released. They close remote injection security holes that attackers could exploit remotely by means of manipulated messages and packets.

According to heise Security:

Version 0.7.2 remedied two buffer overflows in the modules that support MSN and Yahoo protocols. The security service provider Secunia had discovered the hole in the Yahoo module that allowed specially crafted authentication queries to exploit a format-string vulnerability in the function that adds Yahoo contacts to the contact list. For this vulnerability to be exploited, however, Miranda has to be connected to a manipulated server. The developers did not provide any further details concerning the flaw in the MSN module.

You can read the changelog for Miranda IM 0.7.2 or the changelog for Miranda IM 0.7.3.

Download the latest version of Miranda IM here.

  • WinPcap allows for privilege escalation

Security service provider iDefnese has warned of a vulnerability in the NPF.SYS device driver of WinPcap that could allow attackers to execute arbitrary code in kernel context.  Applications such as Wireshark use this library to capture network packets.

According to iDefense:

The problem specifically exists within the bpf_filter_init function. In several places throughout this function, values supplied from a potential attacker are used as array indexes without proper bounds checking. By making IOCTL requests with specially chosen values, attackers are able to corrupt the stack, or pool memory, within the kernel.

This flaw affects WinPcap 4.0.1 and is fixed in WinPcap 4.0.2.

You can download he new version of WinPcap here.

About

Paul Mah is a writer and blogger who lives in Singapore, where he has worked for a number of years in various capacities within the IT industry. Paul enjoys tinkering with tech gadgets, smartphones, and networking devices.