Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Apple's scariest bug this week: Your device pwned over Wi-Fi
ZDNet ^ | March 24, 2016 | By Larry Seltzer for Zero Day

Posted on 03/25/2016 8:52:29 PM PDT by Swordmaker

The iMessage vulnerability got a lot of attention, but another bug allows for remote execution over Wi-Fi, which is a much bigger threat.

Apple released new versions of several operating system products earlier this week, fixing vulnerabilities in OS X El Capitan and iOS 9 among others.

Because encryption and Apple are big news these days, the attention mostly went to an admittedly interesting flaw in Apple's encryption for iMessage, reported by a research team, led by well-known cryptographer Matthew Green. But the bug is not an easy one to exploit and doesn't even expose a lot.

There are much scarier vulnerabilities in this week's disclosures. Perhaps at the top of the list are CVE-2016-0801 and CVE-2016-0802, attributed to an anonymous researcher. Through this bug "[a]n attacker with a privileged network position may be able to execute arbitrary code."

In fact, the bug is in a Broadcom Wi-Fi driver as described on source.android.com in the fix it issued on February 1:

Multiple remote execution vulnerabilities in the Broadcom Wi-Fi driver could allow a remote attacker to use specially crafted wireless control message packets to corrupt kernel memory in a way that leads to remote code execution in the context of the kernel. These vulnerabilities can be triggered when the attacker and the victim are associated with the same network. This issue is rated as a Critical severity due to the possibility of remote code execution in the context of the kernel without requiring user interaction.

Now that's scary! You're on a Wi-Fi network, perhaps a public one but not necessarily, maybe even on a VPN, and any other user on that network can cause your computer to execute kernel-level code. It doesn't get much more vulnerable than that. Patch. Right. Now.

We wrote about the Android fix at the time. That means for almost 7 weeks this bug was disclosed and vulnerable in iOS, OS X, tvOS and WatchOS, not to mention who knows how many other companies' products. The Android disclosure comes with helpful links to the source code fixes, perhaps making things easier for attackers.

And remember, these bugs were disclosed by the Android Project along with fixes for Google's Nexus devices. What about other devices where the fixes are issued by carriers? I see no fixes since then for my AT&T Samsung Galaxy S4.

The best advice I can give you, as I would have given you anyway, is to patch quickly. If patches are not available, then cross your fingers. That's about all you can do.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: apple; applepinglist; broadcom; bug; imessage; security; wifi

1 posted on 03/25/2016 8:52:29 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: Swordmaker

I do not use iMessage, so I should be ok, correct?


2 posted on 03/25/2016 8:54:29 PM PDT by usconservative (When The Ballot Box No Longer Counts, The Ammunition Box Does. (What's In Your Ammo Box?))
[ Post Reply | Private Reply | To 1 | View Replies]

To: ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; altair; ...
The iMessage vulnerability got a lot of attention, but another bug allows for remote execution over Wi-Fi, which is a much bigger threat. Apple's scariest bug this week: Your device owned over Wi-Fi? Not that likely. . . has to be a BroadCom Router and you have to be on an insecure WIFI. — PING!


Apple Security
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

3 posted on 03/25/2016 8:57:46 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

So if you don’t allow your iPhone to connect to wi-fi, you’re cool, yes?


4 posted on 03/25/2016 9:02:18 PM PDT by glock rocks (TTTT !)
[ Post Reply | Private Reply | To 1 | View Replies]

To: usconservative
I do not use iMessage, so I should be ok, correct?

This one is not about the iMessage vulnerability but that was not really a problem at all. To gain the iMessage key required someone with actual access to an iPhone to send the same photo thousands of times through a man-in-the-middle fake server to another Apple device, subtly changing the photo each time so they could see what the server got each time. From that, they could eventually figure out what the 128bit AES encryption key was. This was not a likely scenario for anyone to intercept the average user's iMessages.

If you sent any messages at all on an iPhone, you've used iMessage. It will either go normal message through the cell carrier, or encrypted iMessage through Apple's servers.

5 posted on 03/25/2016 9:05:08 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 2 | View Replies]

To: glock rocks
So if you don’t allow your iPhone to connect to wi-fi, you’re cool, yes?

The bug is in Broadcom's routers. If you are using someone else's routers, you're cool. Yes. . . and for the most part, if you're using a secure router setup you're cool also. I generally will not use any WIFI in public. It may claim to be secure, but who knows who owns the service.

6 posted on 03/25/2016 9:07:42 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ThunderSleeps; ShadowAce; dayglored

This affects all but Nexus Android devices as the fix has not been applied to the vast majority of those Android devices. . . likelihood is it also has issues with some Windows installs.


7 posted on 03/25/2016 9:09:46 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Swordmaker

... as I had hoped. Thank you.


8 posted on 03/25/2016 9:49:07 PM PDT by glock rocks (TTTT !)
[ Post Reply | Private Reply | To 6 | View Replies]

To: glock rocks

You an connect to wifi - just use caution on public/non-secure/non-password protected wifi. Even then - it isn’t as simple as these alarmists pieces make it sound.


9 posted on 03/29/2016 10:53:21 AM PDT by TheBattman (Isn't the lesser evil... still evil?)
[ Post Reply | Private Reply | To 4 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson