	{"id":29521,"date":"2014-07-01T10:30:35","date_gmt":"2014-07-01T17:30:35","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=29521"},"modified":"2016-10-06T13:55:34","modified_gmt":"2016-10-06T20:55:34","slug":"ios-7-1-2-software-update-contains-security-bug-fixes","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/","title":{"rendered":"iOS 7.1.2 Software Update Contains Security Bug Fixes"},"content":{"rendered":"<p>Apple&#8217;s iOS 7.1.2 software update is now available and contains bug fixes and security updates. iOS 7.1.2 contains fixes for 44 security bugs (CVEs), including 28 memory corruption issues that existed in WebKit, as well as the latest\u00a0<a title=\"The latest iPhone lock screen bypass, and how to stop it\" href=\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/\" target=\"_blank\">iPhone lock screen bypass<\/a>.<\/p>\n<p>This iOS update is available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/ios-7-1-2-software-update\/\" rel=\"attachment wp-att-29587\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-29587\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/iOS-7.1.2-Software-Update.png\" alt=\"iOS 7.1.2 update notice\" width=\"435\" height=\"145\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/iOS-7.1.2-Software-Update.png 435w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/iOS-7.1.2-Software-Update-150x50.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/iOS-7.1.2-Software-Update-300x100.png 300w\" sizes=\"(max-width: 435px) 100vw, 435px\" \/><\/a><\/p>\n<p>In addition to a <a title=\"About the security content of iOS 7.1.2\" href=\"http:\/\/support.apple.com\/kb\/HT6297\" target=\"_blank\">long list of security updates<\/a> contained in iOS 7.1.2, it includes the following bug fixes:<\/p>\n<blockquote>\n<ul>\n<li>Improves iBeacon connectivity and stability<\/li>\n<li>Fixes a bug with data transfer for some 3rd party accessories, including bar code scanners<\/li>\n<li>Corrects an issue with data protection class of Mail attachments<\/li>\n<\/ul>\n<\/blockquote>\n<p>Among the more high profile security flaws addressed in this update is the <a title=\"The latest iPhone lock screen bypass, and how to stop it\" href=\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/\" target=\"_blank\">iPhone lock screen bypass<\/a> issue found in iOS 7.1.1, the previous version of the operating system. A security flaw (CVE-2014-1351)\u00a0allowed someone to use Siri to view an iPhone&#8217;s Contacts without a passcode. Apple addressed the iPhone lock screen bypass issue by requiring the passcode.<\/p>\n<p>Overall, the iOS 7.1.2 software update addresses the following vulnerabilities:<\/p>\n<ul>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1354\" target=\"_blank\">CVE-2014-1354<\/a> :\u00a0Viewing a maliciously crafted XBM file may lead to an\u00a0unexpected application termination or arbitrary code execution.\u00a0An unbounded stack allocation issue existed in the\u00a0handling of XBM files. This issue was addressed through improved\u00a0bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1355\" target=\"_blank\">CVE-2014-1355<\/a>\u00a0:\u00a0An application could cause the device to unexpectedly\u00a0restart.\u00a0A null pointer dereference existed in the handling of\u00a0IOKit API arguments. This issue was addressed through additional\u00a0validation of IOKit API arguments.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1356\" target=\"_blank\">CVE-2014-1356<\/a> :\u00a0A malicious application may be able to execute arbitrary\u00a0code with system privileges.\u00a0A heap buffer overflow existed in launchd&#8217;s handling of\u00a0IPC messages. This issue was addressed through improved bounds\u00a0checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1357\" target=\"_blank\">CVE-2014-1357<\/a> :\u00a0A malicious application may be able to execute arbitrary\u00a0code with system privileges.\u00a0A heap buffer overflow existed in launchd&#8217;s handling of\u00a0log messages. This issue was addressed through improved bounds\u00a0checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1358\" target=\"_blank\">CVE-2014-1358<\/a> : A malicious application may be able to execute arbitrary\u00a0code with system privileges.\u00a0An integer overflow existed in launched. This issue was\u00a0addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1359\" target=\"_blank\">CVE-2014-1359<\/a> :\u00a0A malicious application may be able to execute arbitrary\u00a0code with system privileges.\u00a0An integer underflow existed in launchd. This issue was\u00a0addressed through improved bounds checking.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1360\" target=\"_blank\">CVE-2014-1360<\/a> :\u00a0An attacker possessing an iOS device could potentially\u00a0bypass Activation Lock.\u00a0Devices were performing incomplete checks during device\u00a0activation, which made it possible for malicious individuals to\u00a0partially bypass Activation Lock. This issue was addressed through\u00a0additional client-side verification of data received from activation\u00a0servers.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1352\" target=\"_blank\">CVE-2014-1352<\/a> :\u00a0An attacker in possession of a device may exceed the maximum\u00a0number of failed passcode attempts.\u00a0In some circumstances, the failed passcode attempt\u00a0limit was not enforced. This issue was addressed through additional\u00a0enforcement of this limit.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1353\" target=\"_blank\">CVE-2014-1353<\/a> :\u00a0A person with physical access to a locked device may be able\u00a0to access the application that was in the foreground prior to locking.\u00a0A state management issue existed in the handling of the\u00a0telephony state while in Airplane Mode. This issue was addressed\u00a0through improved state management while in Airplane Mode.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1348\" target=\"_blank\">CVE-2014-1348<\/a> :\u00a0Mail attachments can be extracted from an iPhone 4.\u00a0Data protection was not enabled for mail attachments,\u00a0allowing them to be read by an attacker with physical access to the\u00a0device. This issue was addressed by changing the encryption class of\u00a0mail attachments.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1349\" target=\"_blank\">CVE-2014-1349<\/a> :\u00a0Visiting a maliciously crafted website may lead to an\u00a0unexpected application termination or arbitrary code execution.\u00a0A use after free issue existed in Safari&#8217;s handling of\u00a0invalid URLs. This issue was addressed through improved memory\u00a0handling.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1350\" target=\"_blank\">CVE-2014-1350<\/a> :\u00a0A person with physical access to the device may be able to\u00a0disable Find My iPhone without entering an iCloud password.\u00a0A state management issue existed in the handling of the\u00a0Find My iPhone state. This issue was addressed through improved\u00a0handling of Find My iPhone state.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1361\" target=\"_blank\">CVE-2014-1361<\/a> :\u00a0Two bytes of uninitialized memory could be disclosed to a\u00a0remote attacker.\u00a0An uninitialized memory access issue existed in the\u00a0handling of DTLS messages in a TLS connection. This issue was\u00a0addressed by only accepting DTLS messages in a DTLS connection.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1351\" target=\"_blank\">CVE-2014-1351<\/a> :\u00a0A person with physical access to the phone may be able to\u00a0view all contacts.\u00a0If a Siri request might refer to one of several\u00a0contacts, Siri displays a list of possible choices and the option\u00a0&#8216;More&#8230;&#8217; for a complete contact list. When used at the lock screen,\u00a0Siri did not require the passcode before viewing the complete contact\u00a0list. This issue was addressed by requiring the passcode.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-2875\" target=\"_blank\">CVE-2013-2875<\/a>,\u00a0<span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-2927\" target=\"_blank\">CVE-2013-2927<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1323\" target=\"_blank\">CVE-2014-1323<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1325\" target=\"_blank\">CVE-2014-1325<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1326\" target=\"_blank\">CVE-2014-1326<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1327\" target=\"_blank\">CVE-2014-1327<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1329\" target=\"_blank\">CVE-2014-1329<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1330\" target=\"_blank\">CVE-2014-1330<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1331\" target=\"_blank\">CVE-2014-1331<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1333\" target=\"_blank\">CVE-2014-1333<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1334\" target=\"_blank\">CVE-2014-1334<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1335\" target=\"_blank\">CVE-2014-1335<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1336\" target=\"_blank\">CVE-2014-1336<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1337\" target=\"_blank\">CVE-2014-1337<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1338\" target=\"_blank\">CVE-2014-1338<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1339\" target=\"_blank\">CVE-2014-1339<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1341\" target=\"_blank\">CVE-2014-1341<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1342\" target=\"_blank\">CVE-2014-1342<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1343\" target=\"_blank\">CVE-2014-1343<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1362\" target=\"_blank\">CVE-2014-1362<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1363\" target=\"_blank\">CVE-2014-1363<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1364\" target=\"_blank\">CVE-2014-1364<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1365\" target=\"_blank\">CVE-2014-1365<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1366\" target=\"_blank\">CVE-2014-1366<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1367\" target=\"_blank\">CVE-2014-1367<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1368\" target=\"_blank\">CVE-2014-1368<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1382\" target=\"_blank\">CVE-2014-1382<\/a>,\u00a0<\/span><span style=\"line-height: 1.5em;\"><span style=\"line-height: 1.5em;\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1731\" target=\"_blank\">CVE-2014-1731<\/a> :\u00a0<\/span><\/span>Visiting a maliciously crafted website may lead to an\u00a0unexpected application termination or arbitrary code execution.\u00a0Multiple memory corruption issues existed in WebKit.\u00a0These issues were addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1346\" target=\"_blank\">CVE-2014-1346<\/a> :\u00a0A malicious site can send messages to a connected frame or\u00a0window in a way that might circumvent the receiver&#8217;s origin check.\u00a0An encoding issue existed in the handling of unicode\u00a0characters in URLs. A maliciously crafted URL could have led to\u00a0sending an incorrect postMessage origin. This issue was addressed\u00a0through improved encoding\/decoding.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1345\" target=\"_blank\">CVE-2014-1345<\/a> :\u00a0A maliciously crafted website may be able to spoof its\u00a0domain name in the address bar.\u00a0A spoofing issue existed in the handling of URLs. This\u00a0issue was addressed through improved encoding of URLs.<\/li>\n<\/ul>\n<div>This update is available directly on iOS devices (Settings &gt; General &gt; Software Update), or it can be downloaded and installed in iTunes when a device is connected to a computer with an Internet connection.<\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple&#8217;s iOS 7.1.2 software update is now available and contains bug fixes and security updates. iOS 7.1.2 contains fixes for 44 security bugs (CVEs), including 28 memory corruption issues that existed in WebKit, as well as the latest\u00a0iPhone lock screen bypass. This iOS update is available for: iPhone 4 and later, iPod touch (5th generation) [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":9867,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3151,261,1231,69,1225,1228],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple&#039;s iOS 7.1.2 software update is now available and contains bug fixes and security updates. iOS 7.1.2 contains fixes for 44 security bugs (CVEs),\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iOS 7.1.2 Software Update Contains Security Bug Fixes - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple&#039;s iOS 7.1.2 software update is now available and contains bug fixes and security updates. iOS 7.1.2 contains fixes for 44 security bugs (CVEs),\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-07-01T17:30:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-06T20:55:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/\",\"name\":\"iOS 7.1.2 Software Update Contains Security Bug Fixes - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#primaryimage\"},\"datePublished\":\"2014-07-01T17:30:35+00:00\",\"dateModified\":\"2016-10-06T20:55:34+00:00\",\"description\":\"Apple's iOS 7.1.2 software update is now available and contains bug fixes and security updates. iOS 7.1.2 contains fixes for 44 security bugs (CVEs),\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"iOS 7.1.2 Software Update Contains Security Bug Fixes\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"iOS 7.1.2 Software Update Contains Security Bug Fixes\",\"datePublished\":\"2014-07-01T17:30:35+00:00\",\"dateModified\":\"2016-10-06T20:55:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#webpage\"},\"wordCount\":978,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\",\"keywords\":[\"Apple\",\"Bug Fixes\",\"CVE-2014-1351\",\"iOS\",\"iOS 7.1.2\",\"software update\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple's iOS 7.1.2 software update is now available and contains bug fixes and security updates. iOS 7.1.2 contains fixes for 44 security bugs (CVEs),","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/","og_locale":"en_US","og_type":"article","og_title":"iOS 7.1.2 Software Update Contains Security Bug Fixes - The Mac Security Blog","og_description":"Apple's iOS 7.1.2 software update is now available and contains bug fixes and security updates. iOS 7.1.2 contains fixes for 44 security bugs (CVEs),","og_url":"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-07-01T17:30:35+00:00","article_modified_time":"2016-10-06T20:55:34+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/","name":"iOS 7.1.2 Software Update Contains Security Bug Fixes - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#primaryimage"},"datePublished":"2014-07-01T17:30:35+00:00","dateModified":"2016-10-06T20:55:34+00:00","description":"Apple's iOS 7.1.2 software update is now available and contains bug fixes and security updates. iOS 7.1.2 contains fixes for 44 security bugs (CVEs),","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"iOS 7.1.2 Software Update Contains Security Bug Fixes"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"iOS 7.1.2 Software Update Contains Security Bug Fixes","datePublished":"2014-07-01T17:30:35+00:00","dateModified":"2016-10-06T20:55:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#webpage"},"wordCount":978,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","keywords":["Apple","Bug Fixes","CVE-2014-1351","iOS","iOS 7.1.2","software update"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-2-software-update-contains-security-bug-fixes\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-7G9","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/29521"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=29521"}],"version-history":[{"count":28,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/29521\/revisions"}],"predecessor-version":[{"id":58168,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/29521\/revisions\/58168"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9867"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=29521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=29521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=29521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}