	{"id":23296,"date":"2014-03-11T10:58:06","date_gmt":"2014-03-11T17:58:06","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=23296"},"modified":"2014-03-11T10:58:06","modified_gmt":"2014-03-11T17:58:06","slug":"apples-ios-7-1-update-fixes-41-security-bugs","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/","title":{"rendered":"Apple&#8217;s iOS 7.1 Update Fixes 41 Security Bugs"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-23335\" alt=\"iOS 7.1 update notice\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/iOS-7.1-update.png\" width=\"433\" height=\"145\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/iOS-7.1-update.png 433w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/iOS-7.1-update-150x50.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/iOS-7.1-update-300x100.png 300w\" sizes=\"(max-width: 433px) 100vw, 433px\" \/><\/p>\n<p>Apple has released iOS 7.1 with fixes for 41 security bugs and updates to several root certificates. Additionally, iOS 7.1 contains <a title=\"Apple's iOS 7.1 brings iPhone 4 speed enhancements, iBeacon improvements\" href=\"http:\/\/appleinsider.com\/articles\/14\/03\/11\/apples-ios-71-brings-iphone-4-speed-enhancements-ibeacon-improvements\" target=\"_blank\">speed enhancements<\/a> and improvements to various iOS features, including CarPlay, Siri, iTunes Radio and Calendar.\u00a0This update is available for: iPhone 4 and later,\u00a0iPod touch (5th generation) and later, iPad 2 and later.<\/p>\n<p>Updates to the iOS Certificate Trust Policy include the addition and removal of several certificates from the list of system roots. On feature improvements, talking to Siri just got more convenient. Now, as mentioned in the iOS update notice, you can &#8220;Manually control when Siri listens by holding down the home button while you speak and releasing it when you&#8217;re done as an alternative to letting Siri automatically notice when you stop talking.&#8221;<\/p>\n<p>iOS 7.1 <a title=\"About the security content of iOS 7.1\" href=\"http:\/\/support.apple.com\/kb\/HT6162\" target=\"_blank\">addresses<\/a> the following vulnerabilities:<\/p>\n<div>\n<ul>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5133\" target=\"_blank\">CVE-2013-5133<\/a> :\u00a0A maliciously crafted backup can alter the filesystem.\u00a0A symbolic link in a backup would be restored, allowing\u00a0subsequent operations during the restore to write to the rest of the\u00a0filesystem. This issue was addressed by checking for symbolic links\u00a0during the restore process.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1267\" target=\"_blank\">CVE-2014-1267<\/a> :\u00a0Profile expiration dates were not honored. Expiration dates of mobile configuration profiles were\u00a0not evaluated correctly. The issue was resolved through improved\u00a0handling of configuration profiles.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1271\" target=\"_blank\">CVE-2014-1271<\/a> :\u00a0A malicious application can cause an unexpected system\u00a0termination.\u00a0A reachable assertion issue existed in CoreCapture&#8217;s\u00a0handling of IOKit API calls. The issue was addressed through\u00a0additional validation of input from IOKit.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1272\" target=\"_blank\">CVE-2014-1272<\/a> :\u00a0A local user may be able to change permissions on arbitrary\u00a0files.\u00a0CrashHouseKeeping followed symbolic links while\u00a0changing permissions on files. This issue was addressed by not\u00a0following symbolic links when changing permissions on files.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1273\" target=\"_blank\">CVE-2014-1273<\/a> :\u00a0Code signing requirements may be bypassed.\u00a0Text relocation instructions in dynamic libraries may\u00a0be loaded by dyld without code signature validation. This issue was\u00a0addressed by ignoring text relocation instructions.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1274\" target=\"_blank\">CVE-2014-1274<\/a> :\u00a0A person with physical access to the device may be able to\u00a0access FaceTime contacts from the lock screen. FaceTime contacts on a locked device could be exposed\u00a0by making a failed FaceTime call from the lock screen. This issue was\u00a0addressed through improved handling of FaceTime calls.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1275\" target=\"_blank\">CVE-2014-1275<\/a> :\u00a0Viewing a maliciously crafted PDF file may lead to an\u00a0unexpected application termination or arbitrary code execution.\u00a0A buffer overflow existed in the handling of JPEG2000\u00a0images in PDF files. This issue was addressed through improved bounds\u00a0checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2012-2088\" target=\"_blank\">CVE-2012-2088<\/a> :\u00a0Viewing a maliciously crafted TIFF file may lead to an\u00a0unexpected application termination or arbitrary code execution.\u00a0A buffer overflow existed in libtiff&#8217;s handling of TIFF\u00a0images. This issue was addressed through additional validation of\u00a0TIFF images.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-6629\" target=\"_blank\">CVE-2013-6629<\/a> :\u00a0Viewing a maliciously crafted JPEG file may lead to the\u00a0disclosure of memory contents.\u00a0An uninitialized memory access issue existed in\u00a0libjpeg&#8217;s handling of JPEG markers, resulting in the disclosure of\u00a0memory contents. This issue was addressed through additional\u00a0validation of JPEG files.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1276\" target=\"_blank\">CVE-2014-1276<\/a> :\u00a0A malicious application may monitor on user actions in other\u00a0apps.\u00a0An interface in IOKit framework allowed malicious apps\u00a0to monitor on user actions in other apps. This issue was addressed\u00a0through improved access control policies in the framework.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1277\" target=\"_blank\">CVE-2014-1277<\/a> :\u00a0A man-in-the-middle attacker may entice a user into\u00a0downloading a malicious app via Enterprise App Download.\u00a0An attacker with a privileged network position could\u00a0spoof network communications to entice a user into downloading a\u00a0malicious app. This issue was mitigated by using SSL and prompting\u00a0the user during URL redirects.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1278\" target=\"_blank\">CVE-2014-1278<\/a> :\u00a0A local user may be able to cause an unexpected system\u00a0termination or arbitrary code execution in the kernel.\u00a0An out of bounds memory access issue existed in the ARM\u00a0ptmx_get_ioctl function. This issue was addressed through improved\u00a0bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1252\" target=\"_blank\">CVE-2014-1252<\/a> :\u00a0Opening a maliciously crafted Microsoft Word document may\u00a0lead to an unexpected application termination or arbitrary code\u00a0execution.\u00a0A double free issue existed in the handling of\u00a0Microsoft Word documents. This issue was addressed through improved\u00a0memory management.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1281\" target=\"_blank\">CVE-2014-1281<\/a> :\u00a0Deleted images may still appear in the Photos app underneath\u00a0transparent images.\u00a0Deleting an image from the asset library did not delete\u00a0cached versions of the image. This issue was addressed through\u00a0improved cache management.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1282\" target=\"_blank\">CVE-2014-1282<\/a> :\u00a0A configuration profile may be hidden from the user.\u00a0A configuration profile with a long name could be\u00a0loaded onto the device but was not displayed in the profile UI. The\u00a0issue was addressed through improved handling of profile names.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5227\" target=\"_blank\">CVE-2013-5227<\/a> :\u00a0User credentials may be disclosed to an unexpected site via\u00a0autofill.\u00a0Safari may have autofilled user names and passwords\u00a0into a subframe from a different domain than the main frame. This\u00a0issue was addressed through improved origin tracking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1284\" target=\"_blank\">CVE-2014-1284<\/a> :\u00a0A person with physical access to the device may be able to\u00a0disable Find My iPhone without entering an iCloud password.\u00a0A state management issue existed in the handling of the\u00a0Find My iPhone state. This issue was addressed through improved\u00a0handling of Find My iPhone state.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1285\" target=\"_blank\">CVE-2014-1285<\/a> :\u00a0A person with physical access to the device may be able to\u00a0see the home screen of the device even if the device has not been\u00a0activated.\u00a0An unexpected application termination during activation\u00a0could cause the phone to show the home screen. The issue was\u00a0addressed through improved error handling during activation.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1286\" target=\"_blank\">CVE-2014-1286<\/a> :\u00a0A remote attacker may be able to cause the lock screen to\u00a0become unresponsive.\u00a0A state management issue existed in the lock screen.\u00a0This issue was addressed through improved state management.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-6835\" target=\"_blank\">CVE-2013-6835<\/a> :\u00a0A webpage could trigger a FaceTime audio call without user\u00a0interaction. Safari did not consult the user before launching\u00a0facetime-audio:\/\/ URLs. This issue was addressed with the addition of\u00a0a confirmation prompt.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1287\" target=\"_blank\">CVE-2014-1287<\/a> :\u00a0A person with physical access to the device may be able to\u00a0cause arbitrary code execution in kernel mode.\u00a0A memory corruption issue existed in the handling of\u00a0USB messages. This issue was addressed through additional validation\u00a0of USB messages.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1280\" target=\"_blank\">CVE-2014-1280<\/a> :\u00a0Playing a maliciously crafted video could lead to the device\u00a0becoming unresponsive.\u00a0A null dereference issue existed in the handling of\u00a0MPEG-4 encoded files. This issue was addressed through improved\u00a0memory handling.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-2909\" target=\"_blank\">CVE-2013-2909<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-2926\" target=\"_blank\">CVE-2013-2926<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-2928\" target=\"_blank\">CVE-2013-2928<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5196\" target=\"_blank\">CVE-2013-5196<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5197\" target=\"_blank\">CVE-2013-5197<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5198\" target=\"_blank\">CVE-2013-5198<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5199\" target=\"_blank\">CVE-2013-5199<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5225\" target=\"_blank\">CVE-2013-5225<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-5228\" target=\"_blank\">CVE-2013-5228<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-6625\" target=\"_blank\">CVE-2013-6625<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-6635\" target=\"_blank\">CVE-2013-6635<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1269\" target=\"_blank\">CVE-2014-1269<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1270\" target=\"_blank\">CVE-2014-1270<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1289\" target=\"_blank\">CVE-2014-1289<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1290\" target=\"_blank\">CVE-2014-1290<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1291\" target=\"_blank\">CVE-2014-1291<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1292\" target=\"_blank\">CVE-2014-1292<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1293\" target=\"_blank\">CVE-2014-1293<\/a>,\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1294\" target=\"_blank\">CVE-2014-1294<\/a> :\u00a0Visiting a maliciously crafted website may lead to an\u00a0unexpected application termination or arbitrary code execution.\u00a0Multiple memory corruption issues existed in WebKit.\u00a0These issues were addressed through improved memory handling.<\/li>\n<\/ul>\n<\/div>\n<p>Apple iOS users can download and install the iOS 7.1 software update through iTunes or through your device Settings (select General &gt;\u00a0Software Update).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has released iOS 7.1 with fixes for 41 security bugs and updates to several root certificates. Additionally, iOS 7.1 contains speed enhancements and improvements to various iOS features, including CarPlay, Siri, iTunes Radio and Calendar.\u00a0This update is available for: iPhone 4 and later,\u00a0iPod touch (5th generation) and later, iPad 2 and later. Updates to [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":9867,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3151,261,69,907],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has released iOS 7.1 with fixes for 41 security bugs and updates to several root certificates. Additionally, iOS 7.1 contains speed enhancements and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple&#039;s iOS 7.1 Update Fixes 41 Security Bugs - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has released iOS 7.1 with fixes for 41 security bugs and updates to several root certificates. Additionally, iOS 7.1 contains speed enhancements and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-03-11T17:58:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/\",\"name\":\"Apple's iOS 7.1 Update Fixes 41 Security Bugs - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#primaryimage\"},\"datePublished\":\"2014-03-11T17:58:06+00:00\",\"dateModified\":\"2014-03-11T17:58:06+00:00\",\"description\":\"Apple has released iOS 7.1 with fixes for 41 security bugs and updates to several root certificates. Additionally, iOS 7.1 contains speed enhancements and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple&#8217;s iOS 7.1 Update Fixes 41 Security Bugs\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Apple&#8217;s iOS 7.1 Update Fixes 41 Security Bugs\",\"datePublished\":\"2014-03-11T17:58:06+00:00\",\"dateModified\":\"2014-03-11T17:58:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#webpage\"},\"wordCount\":1119,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\",\"keywords\":[\"Apple\",\"Bug Fixes\",\"iOS\",\"iOS 7.1\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has released iOS 7.1 with fixes for 41 security bugs and updates to several root certificates. Additionally, iOS 7.1 contains speed enhancements and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/","og_locale":"en_US","og_type":"article","og_title":"Apple's iOS 7.1 Update Fixes 41 Security Bugs - The Mac Security Blog","og_description":"Apple has released iOS 7.1 with fixes for 41 security bugs and updates to several root certificates. Additionally, iOS 7.1 contains speed enhancements and","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-03-11T17:58:06+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/","name":"Apple's iOS 7.1 Update Fixes 41 Security Bugs - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#primaryimage"},"datePublished":"2014-03-11T17:58:06+00:00","dateModified":"2014-03-11T17:58:06+00:00","description":"Apple has released iOS 7.1 with fixes for 41 security bugs and updates to several root certificates. Additionally, iOS 7.1 contains speed enhancements and","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple&#8217;s iOS 7.1 Update Fixes 41 Security Bugs"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Apple&#8217;s iOS 7.1 Update Fixes 41 Security Bugs","datePublished":"2014-03-11T17:58:06+00:00","dateModified":"2014-03-11T17:58:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#webpage"},"wordCount":1119,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","keywords":["Apple","Bug Fixes","iOS","iOS 7.1"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apples-ios-7-1-update-fixes-41-security-bugs\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-63K","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/23296"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=23296"}],"version-history":[{"count":30,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/23296\/revisions"}],"predecessor-version":[{"id":23431,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/23296\/revisions\/23431"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9867"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=23296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=23296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=23296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}