backtop


Print 34 comment(s) - last by croc.. on Aug 9 at 8:53 PM


The same exploit that allows the new iPhone 4 jailbreak could put ALL users at risk of data theft.
Hackers salivate at opportunity to exploit thousands of new iPhone unlockers

The iPhone 4 has finally been jailbroken, thanks to the hard work of the Apple Dev Team.  An unlock is expected to soon follow.

Unfortunately, the route used to jailbreak the phone appears to be just as readily exploited for less noble purposes.  The method used by www.jailbreakme.com involves navigating to a website with a PDF document.  Due to poor programming, the PDF is allowed to execute code that would normally be disallowed.  For the jailbreakers, this means executing code that will free your phone from Apple's walled garden.

However, for malicious hackers, this exploit could allow for the theft of your address book, text message database, pictures, and more on any iPhone 4.  Reportedly, the method has not yet been broadly published, but will soon be publicly disclosed.  At that point, black hat hackers will be able to have a field day.

Apple likely will jump at the opportunity to patch this hole, locking out jailbreakers in the process.  As jailbreaking was recently ruled legal in amendments to the Digital Millennium Copyright Act, Apple might otherwise find it harder to justify moving to deliberately shut out the jailbreakers.

You can use iFile or SSH on the iPhone to install a browser plugin called "PDF Loading Warner", which will ask for permission whenever a site wants to display a PDF file.  You can get the .deb file here.  A standard installer should be available on Cydia in the next couple of days.

Until you get that, it's recommended that you limit your browsing to known trusted sites only.  Again, this exploit applies to 
all iPhone 4 users -- not just the ones who jailbroke their phones.

UPDATED: Aug. 3, 2010 1:55 p.m.-

To clarify both iPhone OS 4 and iPhone OS 3 are vulnerable.  This means that virtually any iPhone 3G, 3GS, or iPhone 4 is at risk.  The vulnerability stems from a problem in how the mobile Safari browser processes Compact Font Format (CFF) data.  When it encounters this data -- typically found in PDF documents -- a memory corruption error results, allowing the execution of arbitrary code, including malicious commands.

A full post on this, courtesy of McAffee antivirus researcher David Marcus (sourcing a vulnerability assessment by Vupen) can be found here.

UPDATED 2: Aug. 8, 2010 9:30 p.m.

Apple's has announced plans to remedy the woefully poor parsing code in its mobile Safari browser.  Speaking with CNET, an Apple spokesperson remarked, "We're aware of this reported issue, we have already developed a fix and it will be available to customers in an upcoming software update."

The fix reportedly will block both the exploit that allows unauthorized code to run in the sandbox, and an even more dangerous (or useful, depending on your perspective) exploit that allows code to escape the sandbox and grants root permissions.

The fix will likely be delivered via the iOS 4.1 update, which is currently being beta tested by developers.  The current OS software version is iOS 4.01.

 



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: Question...
By msheredy on 8/3/2010 11:16:30 AM , Rating: -1
It's just for jailbroken phones. The author likes to sensationalize a bit. If you're not jailbroken then no security threat.


RE: Question...
By JazzMang on 8/3/2010 11:37:10 AM , Rating: 5
wrong


RE: Question...
By Apple Of Sodom on 8/3/2010 11:41:52 AM , Rating: 5
No.

"Again, this exploit applies to all iPhone 4 users -- not just the ones who jailbroke their phones."

What they are saying, and I'm trying to make this simple, is that the new method released to jailbreak phones exploits a flaw in the way iOS 4 reads a PDF, allowing arbitrary code to be executed. The code, in this case, jailbreaks your phone. This same method could be used to execute other code that would do damage as opposed to jailbreak the phone.


RE: Question...
By SunAngel on 8/3/10, Rating: -1
RE: Question...
By croc on 8/9/2010 8:53:41 PM , Rating: 1
The 'hack' DID NOT exploit anything. Safari and webkit have so many security flaws that it is beyond a joke.If you just take the time, don't drink the kool aid for a few days, and objectively do a few searches, it will become obvious to you that this is so.

The 'hackers' are merely taking a pre-existing (nd known to all) flaw in Safari's (and webkit's) handling of a PDF to allow injection of a malicious website....

So quit being an Apple apologist for a few days, and go out and learn a bit.


RE: Question...
By jimbojimbo on 8/3/2010 12:48:40 PM , Rating: 2
Wow this guy has it all wrong.

Really people that jailbreak it have an advantage. Cydia will get the patch that'll protect you LOOOONG before Apple will even admit that there's a flaw. In essence you'd be a fool not to jailbreak.


RE: Question...
By Camikazi on 8/3/2010 1:19:44 PM , Rating: 5
You realize that the phones that go to get jailbroken at that site are not open yet the exploit still works right? Kind of proves even phones that are not jailbroken suffer form this exploit. Simple logic there, if the exploit only worked on jailbroken phone then the site could NOT use the exploit to jailbreak the phone in the first place.


"So if you want to save the planet, feel free to drive your Hummer. Just avoid the drive thru line at McDonalds." -- Michael Asher














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki