At this year's Black Hat security conference, one of the largest conferences on Internet and computer security, researchers demonstrated the potential for SMS-based attacks on the iPhone that could disable the device or extract sensitive information from it. Although Apple reportedly was informed of the vulnerability 6 weeks ago, the company released iPhone OS 3.0.1 on 31-Jul-09, the day after the demo. The update is available now, via iTunes.
Researchers Charlie Miller and Collin Mulliner, of Independent Security Evaluators, issued a denial-of-service attack on CNET correspondent Elinor Mills's iPhone by sending her a specially crafted SMS message, or more accurately, hundreds of specially crafted SMS control messages, only the first of which was seen.
While the researchers only showed how attackers might use the method to disable a user's phone, Miller said it was also possible to utilize this exploit to steal data, make calls, and send text messages. In fact, once having gained access to a user's phone, an attacker could then spread the attack further by sending SMS messages to the numbers listed in the address book.
While a reboot would restore functionality to a disabled phone and is about all a user could do, it takes only seconds for an attacker to swipe sensitive data and gain access to the address book. Worse, although we haven't seen commentary about this, since SMS uses a store-and-forward mechanism, messages sent while a phone was turned off would theoretically be delivered as soon as it was turned back on.
What's especially dangerous about this attack is that it requires no action on the part of the user. Typically, iPhone attacks involve tricking the user into visiting a malicious Web site or opening a specially crafted file - thus giving potential victims at least some agency in their defense - but this one only requires that the attacker has the user's phone number.
The exploit was made possible by a memory corruption bug in the way the iPhone handles SMS messages, and affects all versions of the iPhone OS before 3.0.1. If you haven't yet updated to iPhone OS 3.0, now is your chance to go all the way to 3.0.1 and eliminate your vulnerability to this SMS vulnerability.
SMS-based attacks aren't unique to the iPhone, with Miller and Mulliner also demonstrating this particular bug on an Android-based phone. Google patched the hole in Android last week, within a few days of being notified.