One Article Review

Accueil - L'article:
Source NetworkWorld.webp Network World
Identifiant 352637
Date de publication 2017-04-04 11:56:02 (vue: 2017-04-04 11:56:02)
Titre Apple fixes wireless-based remote code execution flaw in iOS
Texte Apple released an iOS update Monday to fix a serious vulnerability that could allow attackers to remotely execute malicious code on the Broadcom Wi-Fi chips used in iPhones, iPads, and iPods.The vulnerability is a stack buffer overflow in the feature that handles authentication responses for the fast BSS transition feature of the 802.11r protocol, also known as fast roaming. This feature allows devices to move easily and securely between different wireless base stations in the same domain.Hackers can exploit the flaw to execute code in the context of the Wi-Fi chip's firmware if they're within the wireless range of the targeted devices.The issue is one of several flaws found by Google Project Zero researcher Gal Beniamini in the firmware of Broadcom Wi-Fi chips. Some of these vulnerabilities also affect Android devices and have been patched as part of Android's April security bulletin.To read this article in full or to leave a comment, please click here
Envoyé Oui
Condensat 11r 802 affect allow allows also android apple april article attackers authentication base based been beniamini between broadcom bss buffer bulletin can chip chips click code comment context could devices different domain easily execute execution exploit fast feature firmware fix fixes flaw flaws found full gal google hackers handles have here ios ipads iphones ipods issue known leave malicious monday move one overflow part patched please project protocol range read released remote remotely researcher responses roaming same securely security serious several some stack stations targeted these they transition update used vulnerabilities vulnerability wireless within zero
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: