An Israeli researcher, frustrated with the lack of response from Apple, has disclosed technical details about two iPhone security flaws he first uncovered more than two months ago.
Aviv Raff, best known as a browser vulnerability researcher, told Apple in July that he had uncovered bugs in the iPhone's Mail application as well as in its version of Safari that could be used to trick users into clicking on malicious links and boost the amount of spam they face.
But after Apple continued to defer patching and declined to set a date for fixing the flaws, Raff decided to go public. "Two and a half months later, and still there is no patch for those vulnerabilities," he complained in a post to his blog. "I've asked Apple several times for a schedule, but they have refused to provide the fix date. Three versions (v2.0.1, v2.02, v2.1) have been released since I provided them with the details, and they are still 'working on it.'"
In an interview Thursday, Raff said that while he's used this tactic before to pressure a vendor into patching, he's reserved it for companies that "act irresponsibly, as Apple did this time and other vendors have done other times." Raff said he last contacted Apple a week ago.
Apple last patched the iPhone on 12 September, when it issued fixes for eight security vulnerabilities as part of the v2.1 update.
Both Mail and Safari truncate URLs to accommodate the iPhone's small screen, said Raff, a bug that hackers could exploit by feeding malicious links via HTML messages. Because Mail cuts out the middle portion of a long URL, the attacker could spoof a legitimate domain by using a legitimate service such as Facebook to provide the first bits of the address but tuck the malicious part of the URL after the iPhone's cut-off.
Raff demonstrated a possible exploit by creating a link that, at least to an iPhone owner, appeared to be a URL to Facebook's sign-in site, but was actually a link to an image he'd posted on his own domain.
"The user will have to look carefully at all links that he clicks," said Raff when asked for advice on deflecting such attacks. "But this takes a lot of effort as Safari automatically jumps to the end of the URL when clicking on the address bar."
He called the other iPhone bug "a pretty dumb design flaw" that made it easier for spammers to identify valid email accounts, and thus mark them for more spam.
Because the iPhone automatically downloads images attachments, it would be a cinch for spammers to identify a working email account. "The spammer who controls the remote server will know that you have read the message, and will mark your mail account as active, in order to send you more spam," said Raff. Since there is no way to disable auto-image download on the iPhone, he recommended that iPhone users refrain from using Mail until Apple patches the problem.
The same bug has surfaced before in other versions of Apple's Mail software - the company bundles a much brawnier edition with Mac OS X - but those versions have long been patched.
Claiming that the flaws were easily fixed, Raff called on Apple to get on the stick. "It's only a matter of time until the bad guys will find these problems," he said.
Raff isn't the first security researcher to knock Apple's patching process. Last month, two other researchers, including Charlie Miller, who is even better known than Raff in the Mac and iPhone vulnerability arena, took Apple to task for dumping several updates on users in a short time, and without warning.