The Latest in IT Security

Apple Issues Slew of Security Updates for OS X, iOS

23
Apr
2014

Apple customers may find themselves busy this week applying patches issued by the company across a number of products.

In a series of updates, Apple released patches for iOS, OS X and the AirPort Base Station. With Security Update 2014-002, Apple fixes several issues for Mavericks (its latest OS X version), as well as vulnerabilities in Lion and Mountain Lion. Tucked in among the fixes is a critical vulnerability (CVE-2014-1295) that allows what Apple calls a “triple handshake attack.”

“In a ‘triple handshake’ attack, it was possible for an attacker to establish two connections which had the same encryption keys and handshake, insert the attacker’s data in one connection, and renegotiate so that the connections may be forwarded to each other,” according to the advisory. “To prevent attacks based on this scenario, Secure Transport was changed so that, by default, a renegotiation must present the same server certificate as was presented in the original connection.”

This issue does not affect Mac OS X 10.7 systems and earlier. However, it is present on iPhone 4 and later, iPod touch (5th generation) and later and iPad 2 and later. According to Apple, an attacker with a privileged network position who exploited this issue could capture data or change the operations performed in the sessions protected by SSL.

Other important fixes include an issue affecting the CoreServicesUIAgent in OS X Mavericks 10.9.2. According to Apple, visiting a maliciously crafted website that exploits the issue may allow an attacker to execute malicious code.

“A format string issue existed in the handling of URLs,” the advisory explained. “This issue was addressed through additional validation of URLs. This issue does not affect systems prior to OS X Mavericks.”

Apple also issued fixes for several other vulnerabilities in iOS that affect WebKit, the IOKit kernel and the CFNetwork HTTPProtocol. The company also issued a fixfor AirPort Extreme and AirPort Time Capsule base stations with 802.11ac related to the Heartbleed vulnerability.

“An out-of-bounds read issue existed in the OpenSSL library when handling TLS heartbeat extension packets,” according to Apple. “An attacker in a privileged network position could obtain information from process memory. This issue was addressed through additional bounds checking. Only AirPort Extreme and AirPort Time Capsule base stations with 802.11ac are affected, and only if they have Back to My Mac or Send Diagnostics enabled. Other AirPort base stations are not impacted by this issue.”

Tweet

Brian Prince is a Contributing Writer for SecurityWeek.Previous Columns by Brian Prince:Apple Issues Slew of Security Updates for OS X, iOSDDoS Attacks Prove Costly, Could Top 800 Gbps in 2015: ResearchAttacks Targeting Cloud Hosting Providers Rise: Alert LogicOracle Issues Heartbleed UpdatesAttackers Use Facebook to Target Android Users

sponsored links

Tags: NEWS INDUSTRY

Vulnerabilities

Comments are closed.

Categories

THURSDAY, SEPTEMBER 19, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks