	{"id":790,"date":"2009-04-17T09:49:51","date_gmt":"2009-04-17T08:49:51","guid":{"rendered":"http:\/\/blog.intego.com\/?p=790"},"modified":"2012-12-12T13:49:05","modified_gmt":"2012-12-12T21:49:05","slug":"possible-security-flaw-found-in-iphone","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/","title":{"rendered":"Possible Security Flaw Found in iPhone"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\"><\/p>\n<p>Security researcher Charlie Miller, who has <a href=\"https:\/\/www.intego.com\/mac-security-blog\/index.php?s=miller\">found many flaws and vulnerabilities in Mac OS X<\/a> in the past, presented a new iPhone bug at the Black Hat Europe security conference. Discussing something he had just found &#8211; hence the &#8220;possible&#8221; in this article&#8217;s title &#8211; Miller claimed that shellcode can be run on the iPhone. Shellcode is code run from the command line, or, in Mac OS X, the Terminal application, which allows access to the entire filesystem as well as hundreds of different commands. Cited in a <a href=\"http:\/\/www.macworld.com\/article\/140039\/2009\/04\/iphone_vulnerability.html\">Macworld article<\/a>, Miller said that, if an exploit were developed that got past the initial barriers, &#8220;this would allow you to run whatever code you want.&#8221; <\/p>\n<p>For now, this is more of a warning than anything else. Mac OS X can run shellcode &#8211; in fact, many Trojan horses exploit this ability &#8211; but this is an inherent part of the operating system. The real issue is exploits that may be able to launch this code on an iPhone, and we&#8217;re waiting for those to arise.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researcher Charlie Miller, who has found many flaws and vulnerabilities in Mac OS X in the past, presented a new iPhone bug at the Black Hat Europe security conference. Discussing something he had just found &#8211; hence the &#8220;possible&#8221; in this article&#8217;s title &#8211; Miller claimed that shellcode can be run on the iPhone. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Security researcher Charlie Miller, who has found many flaws and vulnerabilities in Mac OS X in the past, presented a new iPhone bug at the Black Hat\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Possible Security Flaw Found in iPhone  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Security researcher Charlie Miller, who has found many flaws and vulnerabilities in Mac OS X in the past, presented a new iPhone bug at the Black Hat\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-04-17T08:49:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-12-12T21:49:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/\",\"name\":\"Possible Security Flaw Found in iPhone - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#primaryimage\"},\"datePublished\":\"2009-04-17T08:49:51+00:00\",\"dateModified\":\"2012-12-12T21:49:05+00:00\",\"description\":\"Security researcher Charlie Miller, who has found many flaws and vulnerabilities in Mac OS X in the past, presented a new iPhone bug at the Black Hat\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Possible Security Flaw Found in iPhone\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Possible Security Flaw Found in iPhone\",\"datePublished\":\"2009-04-17T08:49:51+00:00\",\"dateModified\":\"2012-12-12T21:49:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#webpage\"},\"wordCount\":180,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\",\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Security researcher Charlie Miller, who has found many flaws and vulnerabilities in Mac OS X in the past, presented a new iPhone bug at the Black Hat","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/","og_locale":"en_US","og_type":"article","og_title":"Possible Security Flaw Found in iPhone  - The Mac Security Blog","og_description":"Security researcher Charlie Miller, who has found many flaws and vulnerabilities in Mac OS X in the past, presented a new iPhone bug at the Black Hat","og_url":"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-04-17T08:49:51+00:00","article_modified_time":"2012-12-12T21:49:05+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/","name":"Possible Security Flaw Found in iPhone - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#primaryimage"},"datePublished":"2009-04-17T08:49:51+00:00","dateModified":"2012-12-12T21:49:05+00:00","description":"Security researcher Charlie Miller, who has found many flaws and vulnerabilities in Mac OS X in the past, presented a new iPhone bug at the Black Hat","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Possible Security Flaw Found in iPhone"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Possible Security Flaw Found in iPhone","datePublished":"2009-04-17T08:49:51+00:00","dateModified":"2012-12-12T21:49:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#webpage"},"wordCount":180,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/possible-security-flaw-found-in-iphone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg","articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cK","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/790"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=790"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/790\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}