If you’re an Apple user, you should have been notified of the latest updates to iOS and OS X.
Official updates are available for the most recent three OS X versions via the App Store or as standalone installers:
- OS X 10.11.3 El Capitan. (Upgrade from 10.11.2 only.)
- OS X 10.11.3 El Capitan Combo. (Upgrade from any earlier 10.11 version.)
- Security Update 2016-001 for Yosemite. (Previous OS X, 10.10.)
- Security Update 2016-001 for Mavericks. (Pre-previous OS X, 10.9.)
You definitely want this OS X update, because of the security holes it fixes.
In the El Capitan update, for example, Apple has patched six bugs listed as “a local user may be able to execute arbitrary code with kernel privileges”, which means that any malware or other untrusted code that reached your Mac could have acquired unlimited powers – without popping up any password prompts.
Additionally, a libxslt bug that could be triggered via your browser is listed as “visiting a maliciously crafted website may lead to arbitrary code execution.”
It’s the usual story that remote code execution (RCE) and elevation of privilege (EoP) bugs should never be seen in isolation, because the two can be combined to provide total remote compromise.
But that’s not what this article is really about!
The most interesting bug of the lot is this one, fixed in the iOS 9.2.1 update:
WEBSHEET Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious captive portal may be able to access the user's cookies Description: An issue existed that allowed some captive portals to read or write cookies. The issue was addressed through an isolated cookie store for all captive portals. CVE-2016-1730 : Adi Sharabani and Yair Amit of SKYCURE
The Skycure researchers have now described the hole they found, and it’s both interesting and important at the same time.
You know how your iPhone tries to detect when a Wi-Fi hotspot is trying to redirect you to a login page, known as a “captive portal”, and then displays the captive portal in a special pop-over browser window?
Greatly simplified, iOS does this by fetching the URL…
…and waiting for the captive portal to redirect the request to its own sign-up page.
Usually, instead of seeing Apple’s real “success.html” page, which just contains one word, Success, you see the login page served up by the captive portal.
This means you can interact with the captive portal, including signing up and agreeing to terms and conditions if necessary, in order to deactivate the captive portal and activate regular access to the internet.
The Skycure researchers noticed that iOS incorrectly shared web cookies already set in mobile Safari with the captive portal page, as well as sharing new cookies set in the captive portal back with mobile Safari.
That could allow a malicious captive portal to pull off numerous tricks:
- If you were already logged in to various online services, the portal could steal your authentication cookies and later pretend to be you. Your accounts could be hijacked, just like Firesheep all over again.
- If you weren’t logged in, the portal could login as someone else, and set authentication cookies for later. You’d think you were logged in, but your subsequent interactions with services such as social media accounts would happen under someone else’s name.
A LONG FIX
Believe it or not, Skycure states that “we reported this issue to Apple on June 3, 2013. This is the longest it has taken Apple to fix a security issue reported by us.”
Given the potential severity of this bug, it’s to Skycure’s credit that the company kept faith with Apple and didn’t go public until the fix was finally ready:
It is important to note that the fix was more complicated than one would imagine. However, as always, Apple was very receptive and responsive to ensure the security of iOS users.
And, in conclusion, Skycure notes:
Starting with iOS 9.2.1, iOS employs an isolated Cookie Store for all Captive Portals. As with almost any update for iOS, we recommend users and organizations upgrade to the latest iOS version promptly.
We agree – head to Settings | General | Software Update to make sure you’re patched.
Patch early, patch often!
Image of iPhone and Wi-fi logo courtesy of Shutterstock.
7 comments on “Update your iPhone to stop free Wi-Fi networks stealing your logins!”
You got your “previous” and “pre-previous” releases of OS X the wrong way around.
Aaaargh. I did indeed. I’ve fixed it now…thanks.
Sigh … maybe I ought to *finally* upgrade my iPhone 4.
Is it me or is the headline wrong? My iPhone doesn’t run El Capitan or Yosemite. The title says “Update your iPhone ” but should it not say “Update you Apple machines/equipment/laptops/machines or pretty much anything except the iPhone)
I hear you…but, to be fair, the first sentence in the article says, “If you’re an Apple user, you should have been notified of the latest updates to iOS and OS X.”
Then it touches on the OS X updates before focusing on one specific patch in iOS – the Wi-Fi hotspot one.
Update to my earlier post… Headline!: This article is of interest to Apple people. Persevere a little and you get to the good stuff.
The title is somewhat misleading because the article starts out talking about El Capitan and Yosemite fixes but it does eventually get to the iOS bit.
Just this… Thanks, Paul!!