Jump to content

Recommended Posts

  • ExTS Admin
Posted

Apple fixes memory issue that led to RCE in AirPort routers

 

http://img.photobucket.com/albums/v708/starbuck50/apple-fixes-high-risk-security-flaw-in-airport-routers-505489-2_zpstxiajknj.jpg

 

Yesterday, Apple released new firmware versions for its AirPort router models, which fixed a remote code execution (RCE) flaw tracked as CVE-2015-7029 and reported to the company last year by security researcher Alexandre Helie.

 

Apple says that "a remote attacker may be able to cause arbitrary code execution" and take over the device, based on the complexity of their attack code.

 

CVE-2015-7029 is a memory corruption issue, which Apple says exists in the way the router p****s DNS requests.

Apple didn't mention if the problem is affecting inbound or outbound DNS traffic.

 

Regardless, both exploitation scenarios are trivial since DNS requests are involved in almost every Internet connection set up today.

 

The attack surface is huge, and an attacker would not have to wait long for a successful compromise.

 

Sophos security researcher Paul Ducklin says he believes the problem manifests when "feeding malformed replies to an AirPort that makes outbound DNS requests on behalf of the devices on its internal network," because "most routers are set up to work this way." If true, compromising an AirPort device would be a trivial affair.

 

Apple said it fixed the memory corruption issue by adding better memory bounds checking to prevent code from executing in the wrong parts of the router's memory.

CVE-2015-7029 was fixed in the AirPort base station firmware version 7.7.7.

The firmware is available for download via Apple's website.

 

 

Source:

http://news.softpedia.com/news/apple-fixes-high-risk-security-flaw-in-airport-routers-505489.shtml

Member of:

UNITE

  • 2 months later...
  • Replies 1
  • Created
  • Last Reply

Top Posters In This Topic

Top Posters In This Topic

Posted
Apple fixes memory issue that led to RCE in AirPort routers

 

http://img.photobucket.com/albums/v708/starbuck50/apple-fixes-high-risk-security-flaw-in-airport-routers-505489-2_zpstxiajknj.jpg

 

Yesterday, Apple released new firmware versions for its AirPort router models, which fixed a remote code execution (RCE) flaw tracked as CVE-2015-7029 and reported to the company last year by security researcher Alexandre Helie.

 

Apple says that "a remote attacker may be able to cause arbitrary code execution" and take over the device, based on the complexity of their attack code.

 

CVE-2015-7029 is a memory corruption issue, which Apple says exists in the way the router p****s DNS requests.

Apple didn't mention if the problem is affecting inbound or outbound DNS traffic.

 

Regardless, both exploitation scenarios are trivial since DNS requests are involved in almost every Internet connection set up today.

 

The attack surface is huge, and an attacker would not have to wait long for a successful compromise.

 

Sophos security researcher Paul Ducklin says he believes the problem manifests when "feeding malformed replies to an AirPort that makes outbound DNS requests on behalf of the devices on its internal network," because "most routers are set up to work this way." If true, compromising an AirPort device would be a trivial affair.

 

Apple said it fixed the memory corruption issue by adding better memory bounds checking to prevent code from executing in the wrong parts of the router's memory.

CVE-2015-7029 was fixed in the AirPort base station firmware version 7.7.7.

The firmware is available for download via Apple's website.

 

 

Source:

http://news.softpedia.com/news/apple-fixes-high-risk-security-flaw-in-airport-routers-505489.shtml

Good news i must say, i was using PureVPN android app for this purpose because it offers great support for a diverse range of VPN routers including DDWRT, Tomato, Asus, Belkin, TP-Link, etc. Now apple fixed this thing its a great news i must say.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...