What is the problem
Critical error CVE-2016-4631 in the component Image I / O (Image Processor) works in any version of Apple operating systems, except the latest. They closed the vulnerability. To use the "holes" in the operating system, the attacker must create a iMessage or MMS-message with an attached image in TIFF format.
Once an unsuspecting user opens an image, an attacker full access to the personal data of the device owner. The most important thing - the fact of opening the image on the gadget, so an attacker can lure a victim to a third-party site to view TIFF-images.
How to protect yourself
Do not open the message, the more images from unknown senders. As a rule, in iOS 9.3 and up they go to "unknown sender" section.
What is the problem
Critical error CVE-2016-4631 in the component Image I / O (Image Processor) works in any version of Apple operating systems, except the latest. They closed the vulnerability. To use the "holes" in the operating system, the attacker must create a iMessage or MMS-message with an attached image in TIFF format.
Once an unsuspecting user opens an image, an attacker full access to the personal data of the device owner. The most important thing - the fact of opening the image on the gadget, so an attacker can lure a victim to a third-party site to view TIFF-images.
How to protect yourself
Do not open the message, the more images from unknown senders. As a rule, in iOS 9.3 and up they go to "unknown sender" section.
https://www.iphones.ru/iNotes/593714
No comments :
Post a Comment