{"id":17975,"date":"2013-09-19T15:15:24","date_gmt":"2013-09-19T22:15:24","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=17975"},"modified":"2016-10-06T12:34:25","modified_gmt":"2016-10-06T19:34:25","slug":"apple-ios-7-update-improves-security","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/","title":{"rendered":"Apple iOS 7 Update Improves Security"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/iOS-7-security-update.png\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-17999\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/iOS-7-security-update.png\" alt=\"iOS 7 security update\" width=\"479\" height=\"360\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/iOS-7-security-update.png 479w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/iOS-7-security-update-150x112.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/09\/iOS-7-security-update-300x225.png 300w\" sizes=\"(max-width: 479px) 100vw, 479px\" \/><\/a><\/p>\n<p>Apple has announced that iOS 7 is now available, which improves iOS security and includes hundreds of new features and a new design. The new iOS 7 addresses a gargantuan number of vulnerabilities\u00a0that impacts iPhone 4 and later, iPod touch (5<sup>th<\/sup> generation) and later, iPad 2 and later, and one vulnerability that affects iPhone 3GS.<\/p>\n<p>Highlights from the <a href=\"http:\/\/support.apple.com\/kb\/HT5934\" target=\"_blank\">security contents of iOS 7<\/a> include fixes for a slew of issues including a dozen related to arbitrary code execution, updates to the Root Certificates (the addition or removal of several certificates from the list of system roots), a bypass for the password retry limit, which allows a malicious app to brute force the device unlock code, and a number of fixes for cross-site scripting issues within Webkit \u2013 the provider for browser functions in iOS.<\/p>\n<p>Following are descriptions of all the iOS vulnerabilities (CVEs) fixed in this update:<\/p>\n<ul>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1025\" target=\"_blank\">CVE-2013-1025<\/a> :\u00a0Buffer overflow in CoreGraphics in Apple Mac OS X before 10.8.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted JBIG2 data in a PDF document.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1019\" target=\"_blank\">CVE-2013-1019<\/a> :\u00a0Buffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with Sorenson encoding.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0957\" target=\"_blank\">CVE-2013-0957<\/a> :\u00a0Data Protection in Apple iOS before 7 allows attackers to bypass intended limits on incorrect passcode entry, and consequently avoid a configured Erase Data setting, by leveraging the presence of an app in the third-party sandbox.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5134\" target=\"_blank\">CVE-2013-5134<\/a> : An attacker with a privileged network position may intercept user credentials or other sensitive information. TrustWave, a trusted root CA, has issued, and subsequently revoked, a sub-CA certificate from one of its trusted anchors. This sub-CA facilitated the interception of communications secured by Transport Layer Security (TLS). This update added the involved sub-CA certificate to OS X&#8217;s list of untrusted certificates.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-3950\" target=\"_blank\">CVE-2013-3950<\/a> :\u00a0Stack-based buffer overflow in the openSharedCacheFile function in dyld.cpp in dyld in Apple iOS 5.1.x and 6.x through 6.1.3 makes it easier for attackers to conduct untethering attacks via a long string in the DYLD_SHARED_CACHE_DIR environment variable.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-3955\" target=\"_blank\">CVE-2013-3955<\/a> :\u00a0The get_xattrinfo function in the XNU kernel in Apple iOS 5.x and 6.x through 6.1.3 on iPad devices does not properly validate the header of an AppleDouble file, which might allow local users to cause a denial of service (memory corruption) or have unspecified other impact via an invalid file on an msdosfs filesystem.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1026\" target=\"_blank\">CVE-2013-1026<\/a> :\u00a0Buffer overflow in ImageIO in Apple Mac OS X before 10.8.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted JPEG2000 data in a PDF document.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5137\" target=\"_blank\">CVE-2013-5137<\/a> :\u00a0IOKit in Apple iOS before 7 allows attackers to send user-interface events to the foreground app by leveraging control over a background app and using the (1) task-completion API or (2) VoIP API.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5138\" target=\"_blank\">CVE-2013-5138<\/a> :\u00a0IOCatalogue in IOKitUser in Apple iOS before 7 allows attackers to cause a denial of service (NULL pointer dereference and device crash) via a crafted application.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5139\" target=\"_blank\">CVE-2013-5139<\/a> :\u00a0The IOSerialFamily driver in Apple iOS before 7 allows attackers to execute arbitrary code or cause a denial of service (out-of-bounds array access) via a crafted application.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1028\" target=\"_blank\">CVE-2013-1028<\/a> :\u00a0The IPSec implementation in Apple Mac OS X before 10.8.5, when Hybrid Auth is used, does not verify X.509 certificates from security gateways, which allows man-in-the-middle attackers to spoof security gateways and obtain sensitive information via a crafted certificate.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5140\" target=\"_blank\">CVE-2013-5140<\/a> :\u00a0The kernel in Apple iOS before 7 allows remote attackers to cause a denial of service (assertion failure and device restart) via an invalid packet fragment.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5141\" target=\"_blank\">CVE-2013-5141<\/a> :\u00a0The kernel in Apple iOS before 7 uses an incorrect data size for a certain integer variable, which allows attackers to cause a denial of service (infinite loop and device hang) via a crafted application, related to an &#8220;integer truncation vulnerability.&#8221;<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2011-2391\" target=\"_blank\">CVE-2011-2391<\/a> :\u00a0The IPv6 implementation in the kernel in Apple iOS before 7 allows remote attackers to cause a denial of service (CPU consumption) via crafted ICMPv6 packets.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5142\" target=\"_blank\">CVE-2013-5142<\/a> :\u00a0The kernel in Apple iOS before 7 does not initialize unspecified kernel data structures, which allows local users to obtain sensitive information from kernel stack memory via the (1) msgctl API or (2) segctl API.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-3953\" target=\"_blank\">CVE-2013-3953<\/a> :\u00a0The mach_port_space_info function in osfmk\/ipc\/mach_debug.c in the XNU kernel in Apple Mac OS X 10.8.x does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted call.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-3954\" target=\"_blank\">CVE-2013-3954<\/a> :\u00a0The posix_spawn system call in the XNU kernel in Apple Mac OS X 10.8.x does not properly validate the data for file actions and port actions, which allows local users to (1) cause a denial of service (panic) via a size value that is inconsistent with a header count field, or (2) obtain sensitive information from kernel heap memory via a certain size value in conjunction with a crafted buffer.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5145\" target=\"_blank\">CVE-2013-5145<\/a> :\u00a0kextd in Kext Management in Apple iOS before 7 does not properly verify authorization for IPC messages, which allows local users to (1) load or (2) unload kernel extensions via a crafted message.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2011-3102\" target=\"_blank\">CVE-2011-3102<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-0841\" target=\"_blank\">CVE-2012-0841<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-2807\" target=\"_blank\">CVE-2012-2807<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-5134\" target=\"_blank\">CVE-2012-5134<\/a> : Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution. Multiple memory corruption issues existed in libxml. These issues were addressed by updating libxml to version 2.9.0.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-2825\" target=\"_blank\">CVE-2012-2825<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-2870\" target=\"_blank\">CVE-2012-2870<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-2871\" target=\"_blank\">CVE-2012-2871<\/a> : Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution. Multiple memory corruption issues existed in libxslt. These issues were addressed by updating libxslt to version 1.1.28.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5147\" target=\"_blank\">CVE-2013-5147<\/a> :\u00a0Passcode Lock in Apple iOS before 7 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement by leveraging a race condition involving phone calls and ejection of a SIM card.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-4616\" target=\"_blank\">CVE-2013-4616<\/a> :\u00a0The WifiPasswordController generateDefaultPassword method in Preferences in Apple iOS 6 and earlier relies on the UITextChecker suggestWordInLanguage method for selection of Wi-Fi hotspot WPA2 PSK passphrases, which makes it easier for remote attackers to obtain access via a brute-force attack that leverages the insufficient number of possible passphrases.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5149\" target=\"_blank\">CVE-2013-5149<\/a> :\u00a0The Push Notifications subsystem in Apple iOS before 7 provides the push-notification token to an app without user approval, which allows attackers to obtain sensitive information via an app that employs a crafted push-notification registration process.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1036\" target=\"_blank\">CVE-2013-1036<\/a> :\u00a0Safari in Apple iOS before 7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5150\" target=\"_blank\">CVE-2013-5150<\/a> :\u00a0The history-clearing feature in Safari in Apple iOS before 7 does not clear the back\/forward history of an open tab, which allows physically proximate attackers to obtain sensitive information by leveraging an unattended workstation.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5151\" target=\"_blank\">CVE-2013-5151<\/a> :\u00a0Mobile Safari in Apple iOS before 7 does not prevent HTML interpretation of a document served with a text\/plain content type, which allows remote attackers to conduct cross-site scripting (XSS) attacks by uploading a file.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5152\" target=\"_blank\">CVE-2013-5152<\/a> :\u00a0Mobile Safari in Apple iOS before 7 allows remote attackers to spoof the URL bar via a crafted web site.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5154\" target=\"_blank\">CVE-2013-5154<\/a> :\u00a0The Sandbox subsystem in Apple iOS before 7 determines the sandboxing requirement for a #! application on the basis of the script interpreter instead of the script, which allows attackers to bypass intended access restrictions via a crafted application.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5155\" target=\"_blank\">CVE-2013-5155<\/a> :\u00a0The Sandbox subsystem in Apple iOS before 7 allows attackers to cause a denial of service (infinite loop) via an application that writes crafted values to \/dev\/random.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5158\" target=\"_blank\">CVE-2013-5158<\/a> :\u00a0The Social subsystem in Apple iOS before 7 does not properly restrict access to the cache of Twitter icons, which allows physically proximate attackers to obtain sensitive information about recent Twitter interaction via unspecified vectors.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5153\" target=\"_blank\">CVE-2013-5153<\/a> :\u00a0Springboard in Apple iOS before 7 does not properly manage the lock state in Lost Mode, which allows physically proximate attackers to read notifications via unspecified vectors.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5156\" target=\"_blank\">CVE-2013-5156<\/a> :\u00a0The Telephony subsystem in Apple iOS before 7 does not require API conformity for access to telephony-daemon interfaces, which allows attackers to bypass intended restrictions on phone calls via a crafted app that sends direct requests to the daemon.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5157\" target=\"_blank\">CVE-2013-5157<\/a> :\u00a0The Twitter subsystem in Apple iOS before 7 does not require API conformity for access to Twitter daemon interfaces, which allows attackers to post Tweets via a crafted app that sends direct requests to the daemon.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0879\" target=\"_blank\">CVE-2013-0879<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0991\" target=\"_blank\">CVE-2013-0991<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0992\" target=\"_blank\">CVE-2013-0992<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0993\" target=\"_blank\">CVE-2013-0993<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0994\" target=\"_blank\">CVE-2013-0994<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0995\" target=\"_blank\">CVE-2013-0995<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0996\" target=\"_blank\">CVE-2013-0996<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0997\" target=\"_blank\">CVE-2013-0997<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0998\" target=\"_blank\">CVE-2013-0998<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0999\" target=\"_blank\">CVE-2013-0999<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1000\" target=\"_blank\">CVE-2013-1000<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1001\" target=\"_blank\">CVE-2013-1001<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1002\" target=\"_blank\">CVE-2013-1002<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1003\" target=\"_blank\">CVE-2013-1003<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1004\" target=\"_blank\">CVE-2013-1004<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1005\" target=\"_blank\">CVE-2013-1005<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1006\" target=\"_blank\">CVE-2013-1006<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1007\" target=\"_blank\">CVE-2013-1007<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1008\" target=\"_blank\">CVE-2013-1008<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1010\" target=\"_blank\">CVE-2013-1010<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1037\" target=\"_blank\">CVE-2013-1037<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1038\" target=\"_blank\">CVE-2013-1038<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1039\" target=\"_blank\">CVE-2013-1039<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1040\" target=\"_blank\">CVE-2013-1040<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1041\" target=\"_blank\">CVE-2013-1041<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1042\" target=\"_blank\">CVE-2013-1042<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1043\" target=\"_blank\">CVE-2013-1043<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1044\" target=\"_blank\">CVE-2013-1044<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1045\" target=\"_blank\">CVE-2013-1045<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1046\" target=\"_blank\">CVE-2013-1046<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1047\" target=\"_blank\">CVE-2013-1047<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-2842\" target=\"_blank\">CVE-2013-2842<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5125\" target=\"_blank\">CVE-2013-5125<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5126\" target=\"_blank\">CVE-2013-5126<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5127\" target=\"_blank\">CVE-2013-5127<\/a>, <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5128\" target=\"_blank\">CVE-2013-5128<\/a> : Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5159\" target=\"_blank\">CVE-2013-5159<\/a> :\u00a0WebKit in Apple iOS before 7 allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive information about use of the window.webkitRequestAnimationFrame API via an IFRAME element.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0926\" target=\"_blank\">CVE-2013-0926<\/a> : Copying and pasting a malicious HTML snippet may lead to a cross-site scripting attack. A cross-site scripting issue existed in the handling of copied and pasted data in HTML documents. This issue was addressed through additional validation of pasted content.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1012\" target=\"_blank\">CVE-2013-1012<\/a> :\u00a0Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 6.0.5 allows remote attackers to inject arbitrary web script or HTML via vectors involving IFRAME elements.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-2848\" target=\"_blank\">CVE-2013-2848<\/a> : Visiting a maliciously crafted website may lead to an information disclosure. An information disclosure issue existed in XSSAuditor. This issue was addressed through improved handling of URLs.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5129\" target=\"_blank\">CVE-2013-5129<\/a> :\u00a0Multiple cross-site scripting (XSS) vulnerabilities in WebKit in Apple iOS before 7 allow user-assisted remote attackers to inject arbitrary web script or HTML via vectors involving a (1) drag-and-drop or (2) copy-and-paste operation.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5131\" target=\"_blank\">CVE-2013-5131<\/a> :\u00a0Cross-site scripting (XSS) vulnerability in WebKit in Apple iOS before 7 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.<\/li>\n<\/ul>\n<p>Interestingly enough, history seems to be repeating itself as a new vulnerability was already <a href=\"https:\/\/www.intego.com\/mac-security-blog\/passcode-flaw-found-in-ios-7-that-was-quick\/\" target=\"_blank\">found in iOS 7<\/a> that allows anyone to bypass its lockscreen in seconds to access photos, email and Twitter.<\/p>\n<p>&nbsp;<\/p>\n<blockquote class=\"twitter-tweet\"><p>iOS 7 Bug Lets Anyone Bypass iPhone&#8217;s Lockscreen To Hijack Photos, Email, Or Twitter <a href=\"http:\/\/t.co\/oMZPxbw2tm\">http:\/\/t.co\/oMZPxbw2tm<\/a><\/p>\n<p>\u2014 Andy Greenberg (@a_greenberg) <a href=\"https:\/\/twitter.com\/a_greenberg\/statuses\/380762103797125121\">September 19, 2013<\/a><\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/p>\n<p>That said, it\u2019s a good idea to update to iOS 7 immediately to avoid potential security issues as noted above. Apple iOS users can download and install the 728 MB update through iTunes or through your device Settings (select General &gt;\u00a0<strong>Software Update<\/strong>).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has announced that iOS 7 is now available, which improves iOS security and includes hundreds of new features and a new design. The new iOS 7 addresses a gargantuan number of vulnerabilities\u00a0that impacts iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later, and one vulnerability that affects iPhone 3GS. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":9867,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3151,443,319,135],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has announced that iOS 7 is now available, which improves iOS security and includes hundreds of new features and a new design. The new iOS 7\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple iOS 7 Update Improves Security - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has announced that iOS 7 is now available, which improves iOS security and includes hundreds of new features and a new design. The new iOS 7\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-09-19T22:15:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-06T19:34:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/\",\"name\":\"Apple iOS 7 Update Improves Security - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#primaryimage\"},\"datePublished\":\"2013-09-19T22:15:24+00:00\",\"dateModified\":\"2016-10-06T19:34:25+00:00\",\"description\":\"Apple has announced that iOS 7 is now available, which improves iOS security and includes hundreds of new features and a new design. The new iOS 7\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple iOS 7 Update Improves Security\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Apple iOS 7 Update Improves Security\",\"datePublished\":\"2013-09-19T22:15:24+00:00\",\"dateModified\":\"2016-10-06T19:34:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#webpage\"},\"wordCount\":1778,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\",\"keywords\":[\"Apple\",\"iOS 7\",\"Security\",\"Update\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has announced that iOS 7 is now available, which improves iOS security and includes hundreds of new features and a new design. The new iOS 7","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/","og_locale":"en_US","og_type":"article","og_title":"Apple iOS 7 Update Improves Security - The Mac Security Blog","og_description":"Apple has announced that iOS 7 is now available, which improves iOS security and includes hundreds of new features and a new design. The new iOS 7","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-09-19T22:15:24+00:00","article_modified_time":"2016-10-06T19:34:25+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/","name":"Apple iOS 7 Update Improves Security - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#primaryimage"},"datePublished":"2013-09-19T22:15:24+00:00","dateModified":"2016-10-06T19:34:25+00:00","description":"Apple has announced that iOS 7 is now available, which improves iOS security and includes hundreds of new features and a new design. The new iOS 7","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple iOS 7 Update Improves Security"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Apple iOS 7 Update Improves Security","datePublished":"2013-09-19T22:15:24+00:00","dateModified":"2016-10-06T19:34:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#webpage"},"wordCount":1778,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","keywords":["Apple","iOS 7","Security","Update"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-ios-7-update-improves-security\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-4FV","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/17975"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=17975"}],"version-history":[{"count":47,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/17975\/revisions"}],"predecessor-version":[{"id":58084,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/17975\/revisions\/58084"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9867"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=17975"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=17975"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=17975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}