Official iPhone Software Update 1.01 Discussion

SCMedic

New Member
Bronze
Jul 7, 2007
95
0
0
Be patient. It takes a few minutes and mine appeared to hang for a bit. But all is well. See this link. Firmware update addresses noted Safari security holes.

http://docs.info.apple.com/article.html?artnum=306173

I'm quite sure this is in response to that whole malicious content issue that was supposed to be released this week, about how to take control of the iPhone via safari.. No new content for us. :(
 

insocal

New Member
Bronze
Jun 25, 2007
58
0
0
Whats the difference? Im on 1.0 and it still says CC
In 1.0.1, mine now says BCC. So it isn't always visible when you compose a message to someone but it will still send you a copy. So it must be a new feature but it's weird that it isn't mentioned in any of the new documentation. And also strange that there isn't a BCC OPTION for RECIPIENTS but ONLY for the SELF SENDING. Maybe it was released by accident?
 

tharmsen

New Member
Silver
Jul 5, 2007
873
0
0
The changes:

  • Safari
    CVE-ID: CVE-2007-2400
    Available for: iPhone v1.0
    Impact: Visiting a malicious website may allow cross-site scripting
    Description: Safari's security model prevents JavaScript in remote web pages from modifying pages outside of their domain. A race condition in page updating combined with HTTP redirection may allow JavaScript from one page to modify a redirected page. This could allow cookies and pages to be read or arbitrarily modified. This update addresses the issue by correcting access control to window properties. Credit to Lawrence Lai, Stan Switzer, and Ed Rowe of Adobe Systems, Inc. for reporting this issue.
  • Safari
    CVE-ID: CVE-2007-3944
    Available for: iPhone v1.0
    Impact: Viewing a maliciously crafted web page may lead to arbitrary code execution
    Description: Heap buffer overflows exist in the Perl Compatible Regular Expressions (PCRE) library used by the JavaScript engine in Safari. By enticing a user to visit a maliciously crafted web page, an attacker may trigger the issue, which may lead to arbitrary code execution. This update addresses the issue by performing additional validation of JavaScript regular expressions. Credit to Charlie Miller and Jake Honoroff of Independent Security Evaluators for reporting these issues.
  • WebCore
    CVE-ID: CVE-2007-2401
    Available for: iPhone v1.0
    Impact: Visiting a malicious website may allow cross-site requests
    Description: An HTTP injection issue exists in XMLHttpRequest when serializing headers into an HTTP request. By enticing a user to visit a maliciously crafted web page, an attacker could trigger a cross-site scripting issue. This update addresses the issue by performing additional validation of header parameters. Credit to Richard Moore of Westpoint Ltd. for reporting this issue.
  • WebKit
    CVE-ID: CVE-2007-3742
    Available for: iPhone v1.0
    Impact: Look-alike characters in a URL could be used to masquerade a website
    Description: The International Domain Name (IDN) support and Unicode fonts embedded in Safari could be used to create a URL which contains look-alike characters. These could be used in a malicious web site to direct the user to a spoofed site that visually appears to be a legitimate domain. This update addresses the issue by through an improved domain name validity check.
WebKit
CVE-ID: CVE-2007-2399
Available for: iPhone v1.0
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: An invalid type conversion when rendering frame sets could lead to memory corruption. Visiting a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution. Credit to Rhys Kidd of Westnet for reporting this issue.
 

chefj

New Member
Bronze
Jun 17, 2007
43
0
0
so i guess we are going to have to start over with the mods... re-install jail break and the rest of it?
 

tharmsen

New Member
Silver
Jul 5, 2007
873
0
0
  • Safari
    CVE-ID: CVE-2007-2400
    Available for: iPhone v1.0
    Impact: Visiting a malicious website may allow cross-site scripting
    Description: Safari's security model prevents JavaScript in remote web pages from modifying pages outside of their domain. A race condition in page updating combined with HTTP redirection may allow JavaScript from one page to modify a redirected page. This could allow cookies and pages to be read or arbitrarily modified. This update addresses the issue by correcting access control to window properties. Credit to Lawrence Lai, Stan Switzer, and Ed Rowe of Adobe Systems, Inc. for reporting this issue.
  • Safari
    CVE-ID: CVE-2007-3944
    Available for: iPhone v1.0
    Impact: Viewing a maliciously crafted web page may lead to arbitrary code execution
    Description: Heap buffer overflows exist in the Perl Compatible Regular Expressions (PCRE) library used by the JavaScript engine in Safari. By enticing a user to visit a maliciously crafted web page, an attacker may trigger the issue, which may lead to arbitrary code execution. This update addresses the issue by performing additional validation of JavaScript regular expressions. Credit to Charlie Miller and Jake Honoroff of Independent Security Evaluators for reporting these issues.
  • WebCore
    CVE-ID: CVE-2007-2401
    Available for: iPhone v1.0
    Impact: Visiting a malicious website may allow cross-site requests
    Description: An HTTP injection issue exists in XMLHttpRequest when serializing headers into an HTTP request. By enticing a user to visit a maliciously crafted web page, an attacker could trigger a cross-site scripting issue. This update addresses the issue by performing additional validation of header parameters. Credit to Richard Moore of Westpoint Ltd. for reporting this issue.
  • WebKit
    CVE-ID: CVE-2007-3742
    Available for: iPhone v1.0
    Impact: Look-alike characters in a URL could be used to masquerade a website
    Description: The International Domain Name (IDN) support and Unicode fonts embedded in Safari could be used to create a URL which contains look-alike characters. These could be used in a malicious web site to direct the user to a spoofed site that visually appears to be a legitimate domain. This update addresses the issue by through an improved domain name validity check.
  • WebKit
    CVE-ID: CVE-2007-2399
    Available for: iPhone v1.0
    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code executionDescription: An invalid type conversion when rendering frame sets could lead to memory corruption. Visiting a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution. Credit to Rhys Kidd of Westnet for reporting this issue.
 

tharmsen

New Member
Silver
Jul 5, 2007
873
0
0
so i guess we are going to have to start over with the mods... re-install jail break and the rest of it?
Yup, all for nothing really... Apple was scared the hackers were going to release the hacks to the security flaws in Safari... so they raced a security flaw fix out the door... no new features.