Something like that or a class-action lawsuit is bound to happen. Miller could get in really nasty legal trouble with his stunt, and that would be deserved, considering the level of douchebaggery he displayed.
If it is an early version of ICS, what exactly did they test it on? I'd love to know how they'd gotten access to an unreleased build and what it was running on when tested and why we only have 3.2.1out now.
All ICS news leaks I've seen have pointed to a 4.0 release. The only references to Android 3.5 I can find was from 2010 when people were assuming Gingerbread was going to be 3.0 after a Samsung Galaxy Tab Q&A.
http://www.slashgear.com/samsung-confirm-android-3-5-honeycomb-for-tablets-02100317/
This is complete nonsense.
All modern browsers (IE9+, Firefox, Google Chrome, Opera etc.) have JavaScript interpreters that work at a very low level yet they don't have these security flaws.
I really don't see why Safari in iOS has to be the exception and why Apple has got their panties in a twist over implementing the feature so slowly.
Nothing to really worry about.
That's right, Apple crushed the guy.
How dare he try to help Apple by uncovering a flaw then telling them about it instead of exploiting it.
Moral of the story ? Never be honest, or try and help Apple, they will castrate you.
Nothing like revenge. Apple thrives on it.
You're missing a big point here in the cybercriminal economy, quality is as interesting as quantity. Targetted attacks have been in evidence since 2005, it was only in 2009 that they were sexed up with the name of spear phishing. If I can submit an app and with a payload, that means that I can send an email to someone who will download it from within their own appstore on the iOS device.
There appears to an inordinate focus on privilege escalation, the information gathered from a device can be used for extortion, IP theft or simple corporate espionage. The Chinese FIS have been doing this for years, so why do you assume that the range of jailbroken iOS devices won't have been scrutinised to see what vulnerabilities exist?
Actually, he sent in the exploit a couple months ago, informed them of it 3 weeks ago, and went public in the press this week when they finally found the exploit and followed their own rules about it.That's right, Apple crushed the guy.
How dare he try to help Apple by uncovering a flaw then telling them about it instead of exploiting it.
Moral of the story ? Never be honest, or try and help Apple, they will castrate you.
Nothing like revenge. Apple thrives on it.
Smartphone/Tablet OSs only represent a small fraction of the total computing device marketshare of which Windows XP still has almost 50%.
The marketshare of iOS is nowhere near that of Windows XP let alone all versions of Windows, which all represent much easier targets than iOS.
But why would a cyber-criminal bother going through all that extra effort when easier targets exist including easier targets in the mobile marketplace, such as Android.
Every update from Apple includes a detailed set of release notes that are presented when the update is downloaded and is accessible via the Apple support website.
Most of people's computing practices have changed, they're no longer bound to relying on a personal computer for needs like email and SMS messages.
Most people have more contact info on their phones than on their computers, it's simply more convenient.
That's besides the point. There's a lot of iOS users and even if it proves more challenging than exploiting Android, there's still much to gain since there are generous amount of iOS users.
I'd agree with you somewhat if iOS users were like OS X users where their net marketshare was under 5% of the whole but it's much closer to 45-50% so there's something worthwhile if cyber-crims-hackers are able to take advantage of any vulnerability successfully.
The best targets are those who're in denial thinking they're invulnerable, they also tend to be the most lax in terms of safe practices.
You said Miller couldn't submit his app anonymously, well I think you're absolutely wrong. It's not that he couldn't, he simply chose not to since his intent was not to be malicious, rather to demonstrate and prove a point. ID theft is a serious offense that will land him in jail, however a cybercrim may not be above using someone else's identity to submit a rigged app.
They only show you want they want you to see. Apple's not beyond sliding in hidden features/fixes they don't want the public to be aware of. It's no different from many other companies.
Extortion could potentially occur due to photos but how many people do you know keep photos that could get them extorted on their iOS device?
Thinking that an attacker is going to create a iOS trojan for the chance at an opportunity to extort someone with photos is a hollywood-esque stretching of imagination.
Intellectual property would be associated with an app on the iOS device so this data would only be compromised if the storage of the app wasn't integrated into the protected storage of the iOS device.
Most apps, especially the popular apps, that could potentially be associated with IP data use protected storage.
Corporate espionage would require access to more than the data that is exposed by this vulnerability.
For example, emails aren't exposed by this vulnerability.
Really, then there has been no theft of celebrities phone pictures recently, and honey traps don't occur? Not hollywood, but reality.
Divulging the phone numbers of an exec's phone would't be useful? Look at the animal rights groups that go after pharma execs, for example.
Unfortunately, not all current cyber attacks affect what you deem to be important, but still are important.
Update 4: CNET notes that iOS 5.0.1 addresses the security vulnerability disclosed by prominent security researcher Charlie Miller earlier this week. Miller demonstrated the vulnerability by slipping an app into Apple's App Store, a move which resulted in Apple banning him from the iOS developer program.
https://www.macrumors.com/2011/11/10/apple-releases-ios-5-0-1-to-address-battery-life-issues/
Yep, SOP for bugs, unfortunately.And low and behold like last time it is shown to the public and Apple magicly fixes it in a matter of days. they had nearly a month before hand.
The OSX one was reported to Apple 9 months prior to the publicly telling everyone by the same guy and less than 1 week later Apple fixes.
This guy just proves why the researchers go public with the holes. It gets things fixed.
And low and behold like last time it is shown to the public and Apple magicly fixes it in a matter of days. they had nearly a month before hand.
The OSX one was reported to Apple 9 months prior to the publicly telling everyone by the same guy and less than 1 week later Apple fixes.
This guy just proves why the researchers go public with the holes. It gets things fixed.
*facepalm*
Correlation != causation.
That it hit the news and a fix got released a few days later does not necessarily mean the fix was done between the two events.
All of these incidences are due to account hacking. That means weak passwords not malware.
Nothing about a honey trap requires a phone to be compromised by malware.
Almost always those numbers are available via much more cost effective and less illegal methods than identity theft or falsification to facilitate submitting an app to the app store.
http://consumerist.com/2007/10/how-to-find-an-executives-phone-number-or-email-address.html
And low and behold like last time it is shown to the public and Apple magicly fixes it in a matter of days. they had nearly a month before hand.
The OSX one was reported to Apple 9 months prior to the publicly telling everyone by the same guy and less than 1 week later Apple fixes.
This guy just proves why the researchers go public with the holes. It gets things fixed.
Google Android has a similar bug but the bug in Android does allow for privilege escalation.
The two Android vulnerabilities, which have been reported to Google but not yet patched, shown in this video are:
- A permission escalation allowing the installation of applications with arbitrary permissions without user approval.
- A privilege escalation targeting Androids Linux kernel that allows an unprivileged application to gain root access.
http://blog.duosecurity.com/2011/09/android-vulnerabilities-and-source-barcelona/
The kernel vulnerability in Android presented in the article above is patched but the other issue is still unpatched. These threats were publicly disclosed on Sept. 20, 2011 and were most likely reported to Google prior to being publicly disclosed.
More information about these Android issues is found in the following link:
http://www.securityfocus.com/bid/49709
All immaterial now, but you seem to forget that this vulnerability would have made it easier without hacking an account.
It's not possible Miller became aware of when the vulnerability was going to be patched and then went public soon before?
Beyond that I don't see the point you are trying to make given that Apple is doing a lot better in this regard in comparison to the most analogous alternative to iOS.
So, low and behold Google has not yet fixed a more serious issue in Android despite the vulnerability being public even before this iOS vulnerability was public.
Even worse Android malware developers tend to use public and unpatched privilege escalation vulnerabilities in their malicious apps.
http://threatpost.com/en_us/blogs/g...using-root-exploit-android-gingerbread-081811
http://www.theregister.co.uk/2011/03/04/google_android_market_peril/
From other threads I get the feeling that you hate Google.
If it was the first time I might agree with you but this is yet another one in a fairly long list of times it has lined up this way. Chances are Apple would of done nothing with pushing out an update with out the public embarrassment.
Now... how Charlie got the same exception as MobileSafari is unknown to us. Maybe he found a debug flag to toggle that the App Store reviewer didn't know about. Maybe he found some other hole. Maybe it was as dumb as he just had to insert a special string into the entitlements file and submit it.
My understanding was that as of iOS 5.0+ all ways of accessing a web page (Safari, Web Apps pinned to the home screen and embedded WebView) all have the same privileges - hence how the exploit works.
It now seems that the UIWebView doesn't support the Nitro engine (rather disappointingly).
This is also why I mentioned browsers working at a "low level" (which I consider the memory access to be - the browsers I mentioned ARE doing this).