Languages

About the security content of iOS 6.1 Software Update

This document describes the security content of iOS 6.1.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see Apple Security Updates.

iOS 6.1

  • Identity Services

    Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

    Impact: Authentication relying on certificate-based Apple ID authentication may be bypassed

    Description: An error handling issue existed in Identity Services. If the user's AppleID certificate failed to validate, the user's AppleID was assumed to be the empty string. If multiple systems belonging to different users enter this state, applications relying on this identity determination may erroneously extend trust. This issue was addressed by ensuring that NULL is returned instead of an empty string.

    CVE-ID

    CVE-2013-0963

  • International Components for Unicode

    Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

    Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack

    Description: A canonicalization issue existed in the handling of the EUC-JP encoding, which could lead to a cross-site scripting attack on EUC-JP encoded websites. This issue was addressed by updating the EUC-JP mapping table.

    CVE-ID

    CVE-2011-3058 : Masato Kinugawa

  • Kernel

    Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

    Impact: A user-mode process may be able to access the first page of kernel memory

    Description: The iOS kernel has checks to validate that the user-mode pointer and length passed to the copyin and copyout functions would not result in a user-mode process being able to directly access kernel memory. The checks were not being used if the length was smaller than one page. This issue was addressed through additional validation of the arguments to copyin and copyout.

    CVE-ID

    CVE-2013-0964 : Mark Dowd of Azimuth Security

  • Security

    Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

    Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information

    Description: Several intermediate CA certificates were mistakenly issued by TURKTRUST. This may allow a man-in-the-middle attacker to redirect connections and intercept user credentials or other sensitive information. This issue was addressed by not allowing the incorrect SSL certificates.

  • StoreKit

    Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

    Impact: JavaScript may be enabled in Mobile Safari without user interaction

    Description: If a user disabled JavaScript in Safari Preferences, visiting a site which displayed a Smart App Banner would re-enable JavaScript without warning the user. This issue was addressed by not enabling JavaScript when visiting a site with a Smart App Banner.

    CVE-ID

    CVE-2013-0974 : Andrew Plotkin of Zarfhome Software Consulting, Ben Madison of BitCloud, Marek Durcek

  • WebKit

    Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

    Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution

    Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.

    CVE-ID

    CVE-2012-2857 : Arthur Gerkis

    CVE-2012-3606 : Abhishek Arya (Inferno) of the Google Chrome Security Team

    CVE-2012-3607 : Abhishek Arya (Inferno) of the Google Chrome Security Team

    CVE-2012-3621 : Skylined of the Google Chrome Security Team

    CVE-2012-3632 : Abhishek Arya (Inferno) of the Google Chrome Security Team

    CVE-2012-3687 : kuzzcc

    CVE-2012-3701 : Abhishek Arya (Inferno) of the Google Chrome Security Team

    CVE-2013-0948 : Abhishek Arya (Inferno) of the Google Chrome Security Team

    CVE-2013-0949 : Abhishek Arya (Inferno) of the Google Chrome Security Team

    CVE-2013-0950 : Abhishek Arya (Inferno) of the Google Chrome Security Team

    CVE-2013-0951 : Apple

    CVE-2013-0952 : Abhishek Arya (Inferno) of the Google Chrome Security Team

    CVE-2013-0953 : Abhishek Arya (Inferno) of the Google Chrome Security Team

    CVE-2013-0954 : Dominic Cooney of Google and Martin Barbella of the Google Chrome Security Team

    CVE-2013-0955 : Apple

    CVE-2013-0956 : Apple Product Security

    CVE-2012-2824 : miaubiz

    CVE-2013-0958 : Abhishek Arya (Inferno) of the Google Chrome Security Team

    CVE-2013-0959 : Abhishek Arya (Inferno) of the Google Chrome Security Team

    CVE-2013-0968 : Aaron Nelson

  • WebKit

    Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

    Impact: Copying and pasting content on a malicious website may lead to a cross-site scripting attack

    Description: A cross-site scripting issue existed in the handling of content pasted from a different origin. This issue was addressed through additional validation of pasted content.

    CVE-ID

    CVE-2013-0962 : Mario Heiderich of Cure53

  • WebKit

    Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

    Impact: Visiting a maliciously crafted website may lead to a cross-site scripting attack

    Description: A cross-site scripting issue existed in the handling of frame elements. This issue was addressed through improved origin tracking.

    CVE-ID

    CVE-2012-2889 : Sergey Glazunov

  • WiFi

    Available for: iPhone 3GS, iPhone 4, iPod touch (4th generation), iPad 2

    Impact: A remote attacker on the same WiFi network may be able to temporarily disable WiFi

    Description: An out of bounds read issue exists in Broadcom's BCM4325 and BCM4329 firmware's handling of 802.11i information elements. This issue was addressed through additional validation of 802.11i information elements.

    CVE-ID

    CVE-2012-2619 : Andres Blanco and Matias Eissler of Core Security

 

Important: Mention of third-party websites and products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the selection, performance or use of information or products found at third-party websites. Apple provides this only as a convenience to our users. Apple has not tested the information found on these sites and makes no representations regarding its accuracy or reliability. There are risks inherent in the use of any information or products found on the Internet, and Apple assumes no responsibility in this regard. Please understand that a third-party site is independent from Apple and that Apple has no control over the content on that website. Please contact the vendor for additional information.
Last Modified: Jan 28, 2013
Helpful?
Yes
No
Not helpful Somewhat helpful Helpful Very helpful Solved my problem
Print this page
  • Last Modified: Jan 28, 2013
  • Article: HT5642
  • Views:

    729194
  • Rating:
    • 78.0

    (10678 Responses)

Additional Product Support Information

Start a Discussion
in Apple Support Communities
See all questions on this article See all questions I have asked