02-08-2019, 08:02 AM #1
The security content of iOS 12.1.4 question...
- Member Since
- Jan 01, 2014
- Your Mac's Specs
- MacBookPro 13 v11.1, i5 2.4 GHz, 256 GBs SSD, 8 GBs DDRs
Apple's latest update for iOS patches three security vulnerabilities for iOS, one is Face Time bug and two of them are active attacks in the wild.
The two attacks in the wild relied on memory corruption, where applications could gain either elevated privilege or execute arbitrary code. While it's great that Apple patched these, it brings up a question.
What happens to iOS devices that had already been exploited via the memory corruption based attack, prior to the current security patch applied? Will the patches retro-actively close the application's elevated privilege and/or right to execute arbitrary code? And if it does not, would getting rid of these mean resetting/reinstalling iOS?
Obviously, there isn't much one can do to recover any of the data that had been exploited by these two attacks. Other than "standard" change your passwords that stored on the iOS device, request new credit cards, etc., as applicable.
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)
By macgig in forum Security AwarenessReplies: 1Last Post: 09-11-2017, 05:05 PM
By atomottokar in forum Security AwarenessReplies: 3Last Post: 09-25-2015, 01:07 AM
By Greg55 in forum Switcher HangoutReplies: 5Last Post: 04-27-2010, 08:29 PM
By timeferret in forum Switcher HangoutReplies: 2Last Post: 03-26-2010, 07:30 PM
By mista G in forum Internet, Networking, and WirelessReplies: 2Last Post: 01-02-2009, 06:44 PM