Following yesterday’s release of iOS 6.1.3, which fixed two bugs allowing the iPhone’s passcode lock to be bypassed, another passcode security flaw has been discovered. The vulnerability, which only affects the iPhone 4, involves the Voice Dial command, as demonstrated in the video below from YouTube user videosdebarraquito. iPhoneinCanada tested the method in the video using an iPhone 4 running iOS 6.1.3 and found that the security flaw does indeed exist, giving a potential intruder access to both contacts and photos. Like the previous passcode vulnerability, the current hack involves a complicated set of steps that includes initiating Voice Dial command and quickly ejecting the phone’s SIM card. When the SIM card is removed, the phone opens the recent call log, which gives access to the contact list. In the contact list, adding a photo also gives access to all of the pictures on the device. The previous passcode vulnerability was discovered in mid-February, and it took Apple more than a month to push a fix. An update for the current bypass could follow a similar timeline, but the vulnerability can be fixed by disabling Voice Dial from the Passcode Lock menu. At this time, the vulnerability has only been shown to work with the iPhone 4. We were unable to reproduce the results with an iPhone 5 with Siri disabled, though the bug may potentially affect the pre-Siri iPhone 3GS as well. Update 1:07 PM: iPhoneBlog.de reports that it has reproduced the issue on an iPhone 5 with Siri disabled, although we have still been unable to do so.
New iPhone Passcode Security Flaw Discovered in iO
原文地址:New iPhone Passcode Security Flaw Discovered in iO, 感谢原作者分享。 只是微笑地固执自己的坚持,
相关文章:
你感兴趣的文章:
- 用Java删除文件夹里的所有文件
- 变频器过电压原因及危害
- 禁止使用U盘的完美方案
- MySQL源码:Range跟Ref优化的成本评估
- 请问cygwin下用gdb调试代码的有关问题
- Excel锁定单元格设置