Second Lock Screen Bypass in iOS 6.1 Documented

Discussion in 'iOS Blog Discussion' started by MacRumors, Feb 25, 2013.

  1. macrumors bot

    MacRumors

    Joined:
    Apr 12, 2001
    #1
    [​IMG]


    [​IMG]
    A second iOS 6.1 bug has been discovered that gives access to contacts, photos and more. The vulnerability uses a similar method as the one disclosed previously, though it apparently gives access to more user data when the phone is plugged into a computer.

    It was originally posted on the Full Disclosure mailing list. Kaspersky's Threatpost:
    Apple was expected to fix the lock screen bug in iOS 6.1.2, but that small release fixed a different bug. Instead, it appears a fix for at least one of the lock screen vulnerabilities will be coming in iOS 6.1.3, currently in the hands of developers.

    Update: As noted by iMore and The Next Web, this vulnerability will only allow file access if the device has previously been synced with the computer without a passcode. Plugging the passcode-protected device, even with the bug exploited, into a different computer will simply generate an error message.

    Article Link: Second Lock Screen Bypass in iOS 6.1 Documented
     
  2. macrumors 68000

    Joined:
    Mar 5, 2012
    Location:
    Central California
    #2
    Apple priorities - stop innovation from jailbreak community then fix security issues :(
     
  3. macrumors 65816

    Joined:
    Jun 15, 2010
    #3
    This method allows access to the photos on the phone when hooked up to a computer? That's not news you can always do that, even with a passcode. Smebody posted a complaint bout it on the iPhone forum and everyone criticized the poster for actually wanting to put private photos on their camera roll.
     
  4. macrumors member

    Joined:
    Mar 11, 2006
    #4
    The exploits used by jailbreakers ARE security issues.
     
  5. macrumors 68030

    kbmb

    Joined:
    Mar 13, 2007
    Location:
    NH
    #5
    I thought if you had physical access to the phone.....then you can always get data off it.... regardless of whether it has a passcode lock or not?

    Not through iTunes....but using any number of 3rd party apps that can see the data on the phone.

    -Kevin
     
  6. macrumors P6

    Intell

    Joined:
    Jan 24, 2010
    Location:
    Inside
    #6
    When an iOS device that has been locked with a passcode is connect to a computer that it has never been connected to before, it will not let the computer access any information on the device. The device must be locked so that the passcode is needed to unlock it. Once you connect the device to a computer when it is unlocked, that computer becomes authorized to iOS to allow it to browse the device's contents. No third party utility can get around this lockout, neither can a computer's PTP access.
     
  7. macrumors 6502

    extricated

    Joined:
    Jul 14, 2011
    Location:
    Arkansas
    #7
    No doubt a serious issue, yet there's something pretty amusing to me about the steps required to get past the lockscreen (not to mention what must have been done in order to discover the bug in the first place).
     
  8. macrumors 6502a

    Joined:
    Jul 12, 2010
  9. macrumors 68000

    spazzcat

    Joined:
    Jun 29, 2007
    #9
    Some people have way too much time. Also, does this only work if you have a simple passcode set?
     
  10. macrumors 68030

    kbmb

    Joined:
    Mar 13, 2007
    Location:
    NH
    #10
    Thanks for the info!

    -Kevin
     
  11. macrumors 65816

    lunaoso

    Joined:
    Sep 22, 2012
    Location:
    New England, USA
    #11
    I really want to know how people just happen to stumble upon this stuff. It seems almost rediculous when you think about it.
     
  12. macrumors 68000

    AngerDanger

    Joined:
    Dec 9, 2008
    Location:
    Male
    #12
    I like how there's a small chance that the exploiter will call the police on themselves.
     
  13. macrumors regular

    dweezle3

    Joined:
    Jun 11, 2010
    Location:
    Earth
    #13
    These guys really have way too much time on their hands...
     
  14. macrumors 65816

    furi0usbee

    Joined:
    Jul 11, 2008
    #14
    This is why Apple (and other tech companies) have to hire hackers and people who like to spend time trying this stuff. The reason why these exploits exist is that the programmers program for the way people are supposed to use a device, NOT the way someone intends to use it to circumvent security. You need to have people who are solely looking to crack code or find some obscure exploit somewhere in the emergency dialer....

    I used to play shooters for PC/Xbox. Three days after a release, you would see people finding glitches, doing stuff the devs never intended anyone to do. Why don't you just hire these freaks and let them find all this stuff. That would amount to a more secure and better product.
     
  15. macrumors member

    Joined:
    Sep 6, 2012
    #15
    If someone has gained physical access to my iDevice to attempt to exploit a security vulnerability, all of my other security practices have failed.
     
  16. macrumors 601

    gotluck

    Joined:
    Dec 8, 2011
    Location:
    East Central Florida
    #16
    This. And this is also why the security holes used by the jailbreak are irrelevant.
     
  17. macrumors 6502

    seamer

    Joined:
    Jul 24, 2009
    #17
    Hiring "hackers" is fine in principle. In reality, 99% of the "exploits" found within 3 days of a game launching are most likely revealed by the QA guys who tested the game. Quite often, unless a bug will cause the game to fail a TRC or TCR check, the developers just don't bother. This is largely because of a marketing department who have to meet financial goals rather than quality goals.

    I know we're the ones who write spoiler guides for everything ever released, too.

    /ex-Quality Assurance peon
     
  18. jm001, Feb 25, 2013
    Last edited: Feb 25, 2013

    macrumors 6502

    jm001

    Joined:
    Sep 19, 2011
    #18
    Exactly they must first get physical access to your iPhone. So first line of defence is keep a close watch on your phone. Know where it is at all times. Keep it physically secure.
     
  19. macrumors 68000

    Joined:
    Mar 30, 2011
    Location:
    NY USA
    #19
    Wait, so, if you lose your phone by accident; then you just say oh well, any private data I have on it is fair game and that is okay? Then why even have a passcode on it if it can just be hacked and in your words, if someone has physical access to the device then your data is fair game.

    I do not see that logic. I for one would like to have the confidence that if someone had access to my device then at the most I have lost the device, easily replaced and I did not lose private data that someone can use for purposes not so easily replaced.

    Physical access is not your second line of defence, it is your first line, your second line is rock solid data security which Apple has been failing at recently.
     
  20. macrumors 65816

    Joined:
    Nov 29, 2010
    Location:
    Missouri
    #20
    Not when there is a passcode on it. When there is a passcode, the phone won't mount as a 'camera' like it can unlocked, and apps like iExplorer cannot access the drive
     
  21. macrumors 6502

    Joined:
    May 18, 2007
    Location:
    Seattle, WA
    #21
    Not nearly as "rediculous" as writing about the "hard drive" in a device that has none.
     
  22. macrumors G3

    NT1440

    Joined:
    May 18, 2008
    Location:
    Hartford, CT
    #22
    No, I lose my phone I boot up my machine, then trace it on icloud, and erase it if its in a location that I know isn't where I lost it.

    Very simple.

    If apple is failing at security lately, what does the SIII root access bug (now patched) say? I'd say root access is far more serious than access to my pictures and contacts...

    Also, you're putting words in that user's mouth, and I'm sure he wouldn't appreciate it.
     
  23. macrumors regular

    Joined:
    Jan 31, 2008
    #23
    Great! another way for my girlfriend to gain access to my phone >_>

    good thing I have nothing to hide, but it's annoying when she re-arranges my bloody icons in groups of colors - I then have to spend hours putting everything back in their correct places cause I have OCD like that >_<
     
  24. macrumors 68000

    Joined:
    Mar 30, 2011
    Location:
    NY USA
    #24
    I didn't put words in anyones mouth, he said them. I am sure he is old enough to speak for himself and doesn't need you to speak for him....isn't that the same as putting words in his mouth? Double standard much?

    Let us leave Android out of an iOS discussion for once, huh? Man, this site and its Android paranoia....every Apple fault has to be balanced with an Android fault for some reason.

    As for using Find my iPhone, we all know that is so easy to defeat, it isn't hard to defeat it and you are still giving hackers enough time to get your device, hack into and get your data.

    The point is, Apple needs to step up and close these security holes. There is no defending Apple on this; regardless if other devices have security holes or not, we OWN Apple Devices, I could give a rats tail how easy it is to root an SIII when someone gets my iPhone.
     
  25. macrumors G3

    NT1440

    Joined:
    May 18, 2008
    Location:
    Hartford, CT
    #25
    I can tell from the underlined that you don't actually understand software development. Hackers? Really?

    Find me one OS on the planet that doesn't have a security hole somewhere in it. This is a game of patch a hole, find 2 others. Software is not a cut and dry field.
     

Share This Page