TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

A major iOS/OS X vulnerability comparable to Android Stagefright

108 点作者 willlll将近 9 年前

7 条评论

nhm将近 9 年前
If you&#x27;re allergic to Forbes, I wrote a short summary on my company blog: <a href="https:&#x2F;&#x2F;thisdata.com&#x2F;blog&#x2F;bug-in-apple-products-allows-password-stealing-update-now&#x2F;" rel="nofollow">https:&#x2F;&#x2F;thisdata.com&#x2F;blog&#x2F;bug-in-apple-products-allows-passw...</a><p>Tyler Bohan&#x27;s original disclosure writeup (with some technial details) is here: <a href="http:&#x2F;&#x2F;www.talosintelligence.com&#x2F;reports&#x2F;TALOS-2016-0171&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.talosintelligence.com&#x2F;reports&#x2F;TALOS-2016-0171&#x2F;</a>
评论 #12125545 未加载
comex将近 9 年前
Just for context: almost every update fixes multiple code execution vulnerabilities in WebKit, and browsers are usually much easier and more reliable to exploit than most things due to the JavaScript VM. This bug is arguably more scary than those because it only requires the ability to send someone an image, not an HTML page, but then again, it&#x27;s not generally hard to get someone to click on your link (think fake URL shortener), and while perhaps this bug is powerful enough to be exploited reliably (100% success&#x2F;non-crash rate across all unpatched Apple OSes that might receive the message), if it isn&#x27;t, that would make it considerably less stealthy in practice. (On a webpage you can see the target device and version before even starting the attack.) I don&#x27;t think it&#x27;s really worth freaking out much over, unless you&#x27;re new to the realization that most modern Internet-connected devices are hellishly insecure. :) Though of course you should patch as soon as possible; critically, unlike with Stagefright, all modern iOS devices can, and will be prompted to, install the update.
评论 #12125973 未加载
mrmondo将近 9 年前
FYI, the major part of this is actually a vulnerability in the upstream libxml2 library which is an XML C parser maintained by the GNOME project.<p>The library itself is widely used across various operating systems and software so this is a reminder to please make sure you keep both your OS and your applications up to date. <a href="http:&#x2F;&#x2F;xmlsoft.org" rel="nofollow">http:&#x2F;&#x2F;xmlsoft.org</a>
评论 #12125879 未加载
therealmarv将近 9 年前
Getting so annoyed by forbes.com welcome message. I don&#x27;t understand why they stick to it.
评论 #12125772 未加载
评论 #12125275 未加载
deanclatworthy将近 9 年前
From the article:<p>&gt; The bugs uncovered by Bohan work across all widely-used Apple operating systems, however, including Mac OS X, tvOS and watchOS. Indeed, Bohan noted that Mac OS X doesn’t have sandboxing, giving an attacker remote access to the PC with the victim’s passwords. That potentially makes it a more severe threat to owners of Apple’s PCs, as a simple email could prize Macs open.<p>Sounds like it could be pretty bad.
评论 #12125097 未加载
tedunangst将近 9 年前
Why is iOS storing wifi passwords in the iMessage process? (Somebody please translate the article from Forbes to reality for me.)
评论 #12125297 未加载
评论 #12125260 未加载
iLoch将近 9 年前
Anyone know if the patch has been applied to iOS 10 developer previews?
评论 #12125677 未加载