Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Flaws in Apple Productivity Apps Expose Users to Attacks

Updates released last week by Apple for its productivity apps address a series of vulnerabilities that can be exploited for denial-of-service (DoS) attacks, arbitrary code execution, and user information leakage.

Updates released last week by Apple for its productivity apps address a series of vulnerabilities that can be exploited for denial-of-service (DoS) attacks, arbitrary code execution, and user information leakage.

With the release of Keynote 6.6, Pages 5.6, Numbers 3.6, and iWork for iOS 2.6, Apple resolved multiple input validation issues related to how maliciously crafted documents are parsed. The vulnerabilities were reported to the tech giant by Bruno Morisson of INTEGRITY S.A (CVE-2015-3784), and researchers Behrouz Sadeghipour and Patrik Fehrenbach (CVE-2015-7032).

Sadeghipour and Fehrenbach, who earlier this year reported finding a serious email spoofing flaw in the Google Apps Admin console, identified a vulnerability that can be exploited using a specially crafted document that contains malicious XML data.

Exploitation of the vulnerability, reported to Apple on July 23, can result in user information getting compromised via what is known as an XML External Entity (XXE) attack, Sadeghipour told SecurityWeek on Wednesday.

The researcher pointed to OWASP’s definition of such attacks, which says: “An XML External Entity attack is a type of attack against an application that parses XML input. This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attack may lead to the disclosure of confidential data, denial of service, port scanning from the perspective of the machine where the parser is located, and other system impacts.”

According to the expert, an attacker can exploit the vulnerability by sending a specially crafted Pages, Keynote, or Numbers file to the targeted user. Once the document is opened, the malicious XML data it contains is executed and it reaches an external XML file located on a host controlled by the attacker.

The latest versions of Apple’s productivity apps, available for OS X Yosemite v10.10.4 or later and iOS 8.4 or later, also patch a memory corruption issue (CVE-2015-7033) reported by Felix Groebert of the Google Security Team. Exploitation of the flaw using maliciously crafted documents can lead to the unexpected termination of the application opening the file, or arbitrary code execution.

Groebert also reported a memory corruption issue related to how Pages parses maliciously crafted documents (CVE-2015-7034). This vulnerability can also result in unexpected app termination or code execution.

Advertisement. Scroll to continue reading.

While Apple’s software is generally considered more secure compared to Windows and Android, reports published over the past couple of months have demonstrated that Apple users can still be at risk. Here are some examples:

Apple Working to Patch Gatekeeper Bypass Flaw

XcodeGhost Compiler Malware Targets iOS, OS X Systems

Apple Updates “Sideloading” Process in iOS 9 to Boost App Security

Apple Patches Vulnerabilities in iOS, OS X, iTunes, Xcode

Apple WatchOS 2 Patches Tens of Vulnerabilities

Apple Pulls Data Snooping Apps From App Store

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Wendi Whitmore has taken the role of Chief Security Intelligence Officer at Palo Alto Networks.

Phil Venables, former CISO of Google Cloud, has joined Ballistic Ventures as a Venture Partner.

David Currie, former CISO of Nubank and Klarna, has been appointed CEO of Vaultree.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.