eEye Digital Security eEye Digital Security
  • Login to the eEye Business Client Portal
  • Shop for eEye Products
  • Read the eEye Blog
  • Subscribe to eEye RSS Feeds
  • Follow eEye on Twitter
  • Follow eEye of Facebook
Resources

Research > Zero-Day Tracker > 20130828

iOS and OS X Unicode Core Text Remote Denial of Service

Date Disclosed:
8/28/2013

Date Patched:
9/18/2013

Vendor:
Apple Inc.

Affected Software:
iOS 6 and OS X 10.8

Description:
A remotely exploitable denial of service condition exists when parsing a specific Unicode character sequence (Arabic: \u062E \u0337\u0334\u0310\u062E). The latest versions of OS X and iOS are affected. Core Text, which is utilized by Apple operating systems, handles the displaying of text and font. A segmentation fault is triggered when handing the aforementioned Unicode string, causing software utilizing Core Text to crash or quit ungracefully. This can be used by attackers to take down large numbers of iOS devices in crowded areas by broadcasting SSIDs that contain the malicious Unicode sequence. Additionally, this was used in the wild on Twitter and Facebook to crash OS X web browsers and iOS applications that interact with Twitter and Facebook. Facebook has blocked the Unicode string from being disseminated. 

Severity:
High

Code Execution:
No.

Impact:
Denial of Service
Attackers may leverage this vulnerability to cause iOS applications, such as Messages and Twitter, to crash by Tweeting the malcious string, or sending SMS and iMessages to iOS devices. Additionally, attackers may name WFfi access points (SSIDs) using the malicious Unicode string, causing nearby iOS devices to reboot and OS X machines to experience application instability or system instability when the malicious SSID is displayed on screen (when joining WiFi networks, or after enabling WiFi). 

Mitigation:
No mitigations currently available at this time.

Protection:
 BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 31196 - Apple Mac OS X 10.9 Update - (20131022)
  • 31405 - Apple iOS 7 Update (20130918)

Links:

Status:
2013-08-28: Vulnerability publicly disclosed.
2013-09-18: Apple releases iOS 7
2013-10-22: Apple releases OS X 10.9

Copyright ©1998-2011 eEye Digital Security
Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of eEye. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please email alert@eEye.com for permission.

Disclaimer
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are no warranties, implied or express, with regard to this information. In no event shall the author be liable for any direct or indirect damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.

Next Steps

Free Trial
Test drive an eEye product
On-demand Demo
See an online product tour
One-on-one Demo
Schedule a personalized tour
Compare Products
See side-by-side features
Buy Now
Go to eEye product store
Contact | Site Map | Privacy | Website Feedback | 1.866.339.3732
© 1998 – 2012 eEye Digital Security. All rights reserved.