Security vulnerabilities in the iPhone's e-mail application and Safari Web browser can be used by phishers to dupe users into visiting malicious sites or by spammers to flood the phone's in-box with junk mail, a researcher warned today.
Browser vulnerability researcher Aviv Raff said he reported three separate bugs to Apple Inc. about two weeks ago: two in the iPhone Mail program and one in its Safari browser.
Apple has acknowledged that the two vulnerabilities in Mail are security issues, Raff said, but the company is currently undecided on whether the Safari flaw meets its security bug criteria. At times, Apple has balked at labeling problems as security vulnerabilities, notably in May, when it initially said the so-called "carpet bomb" bug was not security-related. A month later, Apple did patch Safari to stymie the kind of attacks that Raff and other researchers had outlined.
"By creating a specially crafted URL and sending it via an e-mail [message], an attacker can convince the user that the spoofed URL, showed in the Mail application, is from a trusted domain such as a bank, PayPal or social networks," Raff said in a post to his blog Wednesday afternoon. "When clicking on the URL, the Safari browser will be opened, [and] the spoofed URL, showed in the address bar, will still be viewed by the victim as if it is of a trusted domain."
In lieu of any patches, Raff urged users to refrain from following links embedded in messages. If they want to avoid spam, he recommended that they stop using the iPhone's e-mail application completely.
Raff was hesitant to talk about the technical details of any of the three bugs in a follow-up interview conducted using instant messaging, saying that he would not disclose any specifics until Apple patches the problems. But when asked whether the spoofing flaws in Mail and Safari might be somehow related to protocol-handler issues -- a common source of bugs in browsers for more than a year now -- Raff at first said, "No, nothing to do with protocol handling." However, moments later, he added: "Hmmm. Let me rephrase it. Almost nothing to do with protocol handling."
No comments:
Post a Comment