The security content of iOS 12.1.4 question...

Joined
Jan 1, 2014
Messages
629
Reaction score
52
Points
28
Your Mac's Specs
MacBookPro 13 v11.1, i5 2.4 GHz, 256 GBs SSD, 8 GBs DDRs
Apple's latest update for iOS patches three security vulnerabilities for iOS, one is Face Time bug and two of them are active attacks in the wild.

The two attacks in the wild relied on memory corruption, where applications could gain either elevated privilege or execute arbitrary code. While it's great that Apple patched these, it brings up a question.

What happens to iOS devices that had already been exploited via the memory corruption based attack, prior to the current security patch applied? Will the patches retro-actively close the application's elevated privilege and/or right to execute arbitrary code? And if it does not, would getting rid of these mean resetting/reinstalling iOS?

Obviously, there isn't much one can do to recover any of the data that had been exploited by these two attacks. Other than "standard" change your passwords that stored on the iOS device, request new credit cards, etc., as applicable.

TIA...
 

Shop Amazon


Shop for your Apple, Mac, iPhone and other computer products on Amazon.
We are a participant in the Amazon Services LLC Associates Program, an affiliate program designed to provide a means for us to earn fees by linking to Amazon and affiliated sites.
Top