Huge news from Apple: No, not mags, games or TV – more than 50 security bugs to patch

Apple rolls out repairs for 51 iOS flaws, including nasty ones, plus fixes for macOS


In addition to teasing the world with a glimpse of subscriptions services for newspapers and magazines, gaming, and video entertainment, Apple on Monday released iOS 12.2, which patches 51 security vulnerabilities.

The fruit-themed company's fixes cover some serious flaws and should be applied as soon as possible.

Among the most troubling vulnerabilities is a ReplayKit API flaw (CVE-2019-8566) that allows a malicious application to access the microphone on an iPhone, iPad or iPod touch without the authorization or awareness of the user.

"An API issue existed in the handling of microphone data," Apple explains in its security update. "This issue was addressed with improved validation."

Apple watchers may recall in January that the iGiant scrambled to fix a thematically-related FaceTime flaw that enabled a miscreant to force a FaceTime recipient's phone to answer a call, turning the Apple kit into a conduit for potential eavesdropping. That issue was fixed last month.

A related issue affects WebKit (CVE-2019-6222), the heart of mobile Safari, allowing a website to potentially access an iOS device microphone without any indication being shown. A separate Safari bug (CVE-2019-8554) allows a website to access device sensor information without consent.

Reached via Twitter, security researcher Patrick Wardle, chief research officer at Digita Security and founder of Objective-See, said in addition to the Replay Kit flaw, which could be used to spy on people, there's a noteworthy Geo Services bug (CVE-2019-8553) that permits remote code execution.

AI_doomsday_clock

Bad news: Google drops macOS zero-day after Apple misses bug deadline. Good news: It's fiddly to exploit

READ MORE

According to Apple, the flaw could be used to construct a malicious SMS link that triggers arbitrary remote code.

"These are the types of bugs that advanced (nation-state) adversaries exploit to remotely infect targets," said Wardle, who lamented that Apple's iOS platform rules disallow security tools that could thwart or at least detect this sort of attack.

The 12.2 update also fixes an iOS kernel bug (CVE-2019-8527) that a remote attacker could use to crash the system or corrupt kernel memory.

WebKit meanwhile received multiple bandages to prevent maliciously crafted web content from messing with memory in order to achieve arbitrary code execution: CVE-2019-8536, CVE-2019-8544, CVE-2019-7285, CVE-2019-8556, and CVE-2019-8506.

"To me the takeaway is that, iOS is, and always will be a hackable device," said Wardle. "Yes it's very secure, but as is the case with any computing system it's hackable." ®

But wait, there's more...

macOS Mojave 10.14.4 also saw its share of bugs patched – with 38 CVEs. There were a few significant flaws: the AppleGraphicsControl kext suffers from a buffer overflow bug (CVE-2019-8555) that could allow a malicious app to execute arbitrary code with kernel privileges. Also, the Disk Arbitration framework suffers from a logic issue (CVE-2019-8522) that allows an encrypted volume to be unmounted and remounted by a different user without prompting.

The desktop OS also shared some bugs with iOS. The Feedback Assistant allows a malicious app to overwrite arbitrary files (CVE-2019-8521). The XPC Services API meanwhile allows files to be overwritten (CVE-2019-8530). Siri on both iOS and macOS have an hole that allows a malicious application to initiate a Dictation request without user authorization. And macOS is subject to the same kernel bug (CVE-2019-8527) as iOS.

Get updating.

Similar topics


Other stories you might like

  • Think your phone is snooping on you? Hold my beer, says basic physics

    Information wants to be free, and it's making its escape

    Opinion Forget the Singularity. That modern myth where AI learns to improve itself in an exponential feedback loop towards evil godhood ain't gonna happen. Spacetime itself sets hard limits on how fast information can be gathered and processed, no matter how clever you are.

    What we should expect in its place is the robot panopticon, a relatively dumb system with near-divine powers of perception. That's something the same laws of physics that prevent the Godbot practically guarantee. The latest foreshadowing of mankind's fate? The Ethernet cable.

    By itself, last week's story of a researcher picking up and decoding the unintended wireless emissions of an Ethernet cable is mildly interesting. It was the most labby of lab-based demos, with every possible tweak applied to maximise the chances of it working. It's not even as if it's a new discovery. The effect and its security implications have been known since the Second World War, when Bell Labs demonstrated to the US Army that a wired teleprinter encoder called SIGTOT was vulnerable. It could be monitored at a distance and the unencrypted messages extracted by the radio pulses it gave off in operation.

    Continue reading
  • What do you mean you gave the boss THAT version of the report? Oh, ****ing ****balls

    Say what you mean

    NSFW Who, Me? Ever written that angry email and accidentally hit send instead of delete? Take a trip back to the 1990s equivalent with a slightly NSFW Who, Me?

    Our story, from "Matt", flings us back the best part of 30 years to an era when mobile telephones were the preserve of the young, upwardly mobile professionals and fixed lines ruled the roost for more than just your senior relatives.

    Back then, Matt was working for a UK-based fixed-line telephone operator. He was dealing with a telephone exchange which served a relatively large town. "I ran a reasonably ordinary, read-only command to interrogate a specific setting," he told us.

    Continue reading
  • Chinese tech minister says he's 'dealt with' 73,000 websites that breached the law

    Ongoing crackdown saw apps 1.83 million apps tested, 4,200 told to clean up their act, pop-up ads popped

    China's Minister of Industry and Information Technology, Xiao Yaqing, has given a rare interview in which he signalled the nation's crackdown on the internet and predatory companies will continue.

    The interview, reported in state-controlled organ Xinhua, reveals that China's recent crackdowns on inappropriate content and companies with monopolistic tendencies have both bitten – hard.

    The nation investigated 1.83 million apps to ensure they don't infringe users' rights. Some 4,200 illegal apps found to require "rectification".

    Continue reading

Biting the hand that feeds IT © 1998–2021