Apple has just released iOS 4.3.5 for the iPhone, iPad and iPod touch. This update comes just days after the iOS 4.3.4 release and it resolves a “security issue” which has been resolved with certificate verification.
Standalone downloads and geeky specifics below:
iOS Firmware
- BGR: AT&T prepping for early September iPhone 5 launch (9to5mac.com)
- Native iPad app discovered in Facebook for iPhone (9to5mac.com)
From Apple’s KB:
This document describes the security content of iOS 4.3.5, which can be downloaded and installed using iTunes.
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see “How to use the Apple Product Security PGP Key.”
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see “Apple Security Updates“.
Products Affected
iPad, iPod touch (3rd generation), iPhone 4, iPod touch (4th generation), iPhone 3GS, Product Security
iOS 4.3.5 Software Update
- Data SecurityAvailable for: iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM), iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.4 for iPad
- Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS
- Description: A certificate chain validation issue existed in the handling of X.509 certificates. An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS. Other attacks involving X.509 certificate validation may also be possible. This issue is addressed through improved validation of X.509 certificate chains.
- CVE-ID
- CVE-2011-0228 : Gregor Kopf of Recurity Labs on behalf of BSI, and Paul Kehrer of Trustwave’s SpiderLabs
Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS
Description: A certificate chain validation issue existed in the handling of X.509 certificates. An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS. Other attacks involving X.509 certificate validation may also be possible. This issue is addressed through improved validation of X.509 certificate chains.
CVE-ID
CVE-2011-0228 : Gregor Kopf of Recurity Labs on behalf of BSI, and Paul Kehrer of Trustwave’s SpiderLabs