As the iOS 6.1 is now released, Apple has published a list of some security vulnerabilities that existed in the previous version of iOS. The list is rather surprising and shows that no platform can be considered totally secure these days!
Here is the official list from Apple:
Identity Services
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: Authentication relying on certificate-based Apple ID authentication may be bypassed
Description: An error handling issue existed in Identity Services. If the user's AppleID certificate failed to validate, the user's AppleID was assumed to be the empty string. If multiple systems belonging to different users enter this state, applications relying on this identity determination may erroneously extend trust. This issue was addressed by ensuring that NULL is returned instead of an empty string.
CVE-ID
CVE-2013-0963
International Components for Unicode
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack
Description: A canonicalization issue existed in the handling of the EUC-JP encoding, which could lead to a cross-site scripting attack on EUC-JP encoded websites. This issue was addressed by updating the EUC-JP mapping table.
CVE-ID
CVE-2011-3058 : Masato Kinugawa
Kernel
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: A user-mode process may be able to access the first page of kernel memory
Description: The iOS kernel has checks to validate that the user-mode pointer and length passed to the copyin and copyout functions would not result in a user-mode process being able to directly access kernel memory. The checks were not being used if the length was smaller than one page. This issue was addressed through additional validation of the arguments to copyin and copyout.
CVE-ID
CVE-2013-0964 : Mark Dowd of Azimuth Security
Security
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information
Description: Several intermediate CA certificates were mistakenly issued by TURKTRUST. This may allow a man-in-the-middle attacker to redirect connections and intercept user credentials or other sensitive information. This issue was addressed by not allowing the incorrect SSL certificates.
StoreKit
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: JavaScript may be enabled in Mobile Safari without user interaction
Description: If a user disabled JavaScript in Safari Preferences, visiting a site which displayed a Smart App Banner would re-enable JavaScript without warning the user. This issue was addressed by not enabling JavaScript when visiting a site with a Smart App Banner.
CVE-ID
CVE-2013-0974 : Andrew Plotkin of Zarfhome Software Consulting, Ben Madison of BitCloud, Marek Durcek
WebKit
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.
CVE-ID
CVE-2012-2857 : Arthur Gerkis
CVE-2012-3606 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2012-3607 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2012-3621 : Skylined of the Google Chrome Security Team
CVE-2012-3632 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2012-3687 : kuzzcc
CVE-2012-3701 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0948 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0949 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0950 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0951 : Apple
CVE-2013-0952 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0953 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0954 : Dominic Cooney of Google and Martin Barbella of the Google Chrome Security Team
CVE-2013-0955 : Apple
CVE-2013-0956 : Apple Product Security
CVE-2012-2824 : miaubiz
CVE-2013-0958 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0959 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0968 : Aaron Nelson
WebKit
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: Copying and pasting content on a malicious website may lead to a cross-site scripting attack
Description: A cross-site scripting issue existed in the handling of content pasted from a different origin. This issue was addressed through additional validation of pasted content.
CVE-ID
CVE-2013-0962 : Mario Heiderich of Cure53
WebKit
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack
Description: A cross-site scripting issue existed in the handling of frame elements. This issue was addressed through improved origin tracking.
CVE-ID
CVE-2012-2889 : Sergey Glazunov
WiFi
Available for: iPhone 3GS, iPhone 4, iPod touch (4th generation), iPad 2
Impact: A remote attacker on the same WiFi network may be able to temporarily disable WiFi
Description: An out of bounds read issue exists in Broadcom's BCM4325 and BCM4329 firmware's handling of 802.11i information elements. This issue was addressed through additional validation of 802.11i information elements.
CVE-ID
CVE-2012-2619 : Andres Blanco and Matias Eissler of Core Security
Source:
http://support.apple.com/kb/HT1222
http://support.apple.com/kb/HT5642
Sent from my iPhone5 using SatelliteGuys
Here is the official list from Apple:
Identity Services
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: Authentication relying on certificate-based Apple ID authentication may be bypassed
Description: An error handling issue existed in Identity Services. If the user's AppleID certificate failed to validate, the user's AppleID was assumed to be the empty string. If multiple systems belonging to different users enter this state, applications relying on this identity determination may erroneously extend trust. This issue was addressed by ensuring that NULL is returned instead of an empty string.
CVE-ID
CVE-2013-0963
International Components for Unicode
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack
Description: A canonicalization issue existed in the handling of the EUC-JP encoding, which could lead to a cross-site scripting attack on EUC-JP encoded websites. This issue was addressed by updating the EUC-JP mapping table.
CVE-ID
CVE-2011-3058 : Masato Kinugawa
Kernel
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: A user-mode process may be able to access the first page of kernel memory
Description: The iOS kernel has checks to validate that the user-mode pointer and length passed to the copyin and copyout functions would not result in a user-mode process being able to directly access kernel memory. The checks were not being used if the length was smaller than one page. This issue was addressed through additional validation of the arguments to copyin and copyout.
CVE-ID
CVE-2013-0964 : Mark Dowd of Azimuth Security
Security
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information
Description: Several intermediate CA certificates were mistakenly issued by TURKTRUST. This may allow a man-in-the-middle attacker to redirect connections and intercept user credentials or other sensitive information. This issue was addressed by not allowing the incorrect SSL certificates.
StoreKit
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: JavaScript may be enabled in Mobile Safari without user interaction
Description: If a user disabled JavaScript in Safari Preferences, visiting a site which displayed a Smart App Banner would re-enable JavaScript without warning the user. This issue was addressed by not enabling JavaScript when visiting a site with a Smart App Banner.
CVE-ID
CVE-2013-0974 : Andrew Plotkin of Zarfhome Software Consulting, Ben Madison of BitCloud, Marek Durcek
WebKit
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.
CVE-ID
CVE-2012-2857 : Arthur Gerkis
CVE-2012-3606 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2012-3607 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2012-3621 : Skylined of the Google Chrome Security Team
CVE-2012-3632 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2012-3687 : kuzzcc
CVE-2012-3701 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0948 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0949 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0950 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0951 : Apple
CVE-2013-0952 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0953 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0954 : Dominic Cooney of Google and Martin Barbella of the Google Chrome Security Team
CVE-2013-0955 : Apple
CVE-2013-0956 : Apple Product Security
CVE-2012-2824 : miaubiz
CVE-2013-0958 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0959 : Abhishek Arya (Inferno) of the Google Chrome Security Team
CVE-2013-0968 : Aaron Nelson
WebKit
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: Copying and pasting content on a malicious website may lead to a cross-site scripting attack
Description: A cross-site scripting issue existed in the handling of content pasted from a different origin. This issue was addressed through additional validation of pasted content.
CVE-ID
CVE-2013-0962 : Mario Heiderich of Cure53
WebKit
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack
Description: A cross-site scripting issue existed in the handling of frame elements. This issue was addressed through improved origin tracking.
CVE-ID
CVE-2012-2889 : Sergey Glazunov
WiFi
Available for: iPhone 3GS, iPhone 4, iPod touch (4th generation), iPad 2
Impact: A remote attacker on the same WiFi network may be able to temporarily disable WiFi
Description: An out of bounds read issue exists in Broadcom's BCM4325 and BCM4329 firmware's handling of 802.11i information elements. This issue was addressed through additional validation of 802.11i information elements.
CVE-ID
CVE-2012-2619 : Andres Blanco and Matias Eissler of Core Security
Source:
http://support.apple.com/kb/HT1222
http://support.apple.com/kb/HT5642
Sent from my iPhone5 using SatelliteGuys