Monday, July 23, 2007

iPhone Exploit Found

Red Rome Developer Article

Due to the widespread attention paid to the iPhone and the security implications of mobile devices in general, we performed a security evaluation of the new Apple iPhone. While Apple takes some precautions to minimize the amount of code accessible to remote attackers, it did not take other basic precautions in designing a robust security solution for the device. While made more difficult due to the closed nature of the device, with little effort we were able to find a vulnerability in the iPhone. We were then able to leverage this vulnerability and use it to write an exploit which could extract personal information off the device without the user ever knowing.

No comments: