Waiting for the paper on this:<p><pre><code> Impact: An attacker who is able to bypass Apple's certificate pinning,
intercept TLS connections, inject messages, and record encrypted attachment-
type messages may be able to read attachments
Description: A cryptographic issue was addressed by rejecting duplicate
messages on the client.
CVE-2016-1788 : Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers,
and Michael Rushanan of Johns Hopkins University</code></pre>
Hmm:<p><pre><code> CVE-2016-1752 : CESG
CVE-2016-1750 : CESG
</code></pre>
I wonder if that's <<a href="https://www.cesg.gov.uk/>" rel="nofollow">https://www.cesg.gov.uk/></a>, which is "the Information Security Arm of GCHQ". If so I guess we should be thankful that they saw these vulnerabilities is a risk rather than an opportunity.
Apple's basically saying "Here are a bunch of bugs <i>that are not fixed in the version of the phone the FBI has</i>. You don't need us, or source code, or anything other than to hire someone to take advantage of these holes. Go away."<p>Nice timing.<p>Probably pissed off a bunch of the intelligence community today.
So many memory corruption issues, I'd like to think in 5/10 years time this would be solved and everything written in a safe language but maybe I'm being optimistic.