News

The Inner Workings of Eight Apple iOS Vulnerabilities Exposed

2017-07-21 624 Posted by 3uTools

Zimperium has disclosed the details of eight vulnerabilities, which, until recently, left Apple's iOS mobile system open to exploit.


On Thursday, N-day acquisition program Zimperium said the vulnerabilities permitted attackers in some cases to take complete control of a device running Apple's mobile operating system, as well as access information including GPS data, photos, and contact information, or conduct denial-of-service (DoS) attacks.


Zimperium researcher Adam Donenfeld discovered the vulnerabilities, one of which can be found in the IOSurface kernel extension.


This vulnerability, CVE-2017-6979, is a race condition bug that allows attackers to bypass sanity checks for the creation of an IOSurface object. If exploited, the security flaw can result in a local elevation of privilege or denial of service.


Seven others were found in AppleAVEDriver.kext. CVE-2017-6989 and CVE-2017-6995 are bugs that can be used to drop the refcount of any IOSurface object in the kernel or send an arbitrary kernel pointer -- which will be used by the kernel as a pointer to a valid IOSurface object.


Either flaw can be used by attackers for privilege escalation.


The Inner Workings of Eight Apple iOS Vulnerabilities Exposed


Four other issues, CVE-2017-6996CVE-2017-6997CVE-2017-6998, and CVE-2017-6999, were all also present in AppleAVE.kext.


The first bug could be exploited to free any memory block of size 0x28; the second could be exploited to free any pointer of size 0x28; and the third vulnerability, a type confusion problem, allowed hackers to hijack kernel code execution. The final issue could be exploited to make sure user-controlled pointers were zeroed.


All of these security flaws lead to privilege escalation, denial of service, or information disclosure.


Another bug, CVE-2017-6994, allowed attackers to leak the kernel address of any IOSurface object in the system, which by its very nature results in information disclosure.


Apple's iOS before 10.3.2, tvOS before 10.2.1, and watchOS before version 3.2.2 are all affected.


Apple issued a security patch with iOS 10.3.2 in May that patched these issues alongside a range of bugs found in SQLite, WebKit, iBooks, and CoreText, among others.


Donenfeld plans to release additional technical details and proof-of-concept (PoC) code soon, but an embargo stipulated by Apple has delayed the release.


Source: zdnet


Related Articles

Apple Released WatchOS2.1 for Apple Watch Supporting New Languages What Is New in iOS 13 for iPhone Apple Releases Updates For iOS 10.3.2, WatchOS 3.2.2, tvOS 10.2.1 Apple Releases First Developer Betas of iOS 11, watchOS 4, macOS 10.13, and tvOS 11 OverCl0ck Apple Watch Jailbreak For watchOS 3 Released Apple Releases First iOS 11.1, watchOS 4.1, tvOS 11.1, and macOS 10.13.1 Developer Betas Apple Releases iOS 11.4.1, tvOS 11.4.1, and WatchOS 4.3.2 to the Public The ECG App is not Intended for Use by People Under 22 Years Old