Today iOS 7 has been released and therefore every media is focused on it, especially social media. And as this update to iOS brings singificant changes, most notably in the GUI and UX (I dont't want to point them out here, there are enough other sites doing it already), there is a controversial discussion. A lot of people (like me) dislike the gaudy colors, and for me that's the moment to point once again to the Jony Ive Redesigns Things collection.
But what isn't mentioned…
… is the fact that iOS 7 not only a update to the user interface, but also fixes a lot of security issues and bugs like most updates do.
This is a list of all issues fixed according to the official Apple Product Security mailing list which everybody can subscribe:
Certificate Trust PolicyAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Root certificates have been updatedDescription: Several certificates were added to or removed from thelist of system roots.CoreGraphicsAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Viewing a maliciously crafted PDF file may lead to anunexpected application termination or arbitrary code executionDescription: A buffer overflow existed in the handling of JBIG2encoded data in PDF files. This issue was addressed throughadditional bounds checking.CVE-IDCVE-2013-1025 : Felix Groebert of the Google Security TeamCoreMediaAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Playing a maliciously crafted movie file may lead to anunexpected application termination or arbitrary code executionDescription: A buffer overflow existed in the handling of Sorensonencoded movie files. This issue was addressed through improved boundschecking.CVE-IDCVE-2013-1019 : Tom Gallagher (Microsoft) & Paul Bates (Microsoft)working with HP's Zero Day InitiativeData ProtectionAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Apps could bypass passcode-attempt restrictionsDescription: A privilege separation issue existed in DataProtection. An app within the third-party sandbox could repeatedlyattempt to determine the user's passcode regardless of the user's"Erase Data" setting. This issue was addressed by requiringadditional entitlement checks.CVE-IDCVE-2013-0957 : Jin Han of the Institute for Infocomm Researchworking with Qiang Yan and Su Mon Kywe of Singapore ManagementUniversityData SecurityAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: An attacker with a privileged network position may interceptuser credentials or other sensitive informationDescription: TrustWave, a trusted root CA, has issued, andsubsequently revoked, a sub-CA certificate from one of its trustedanchors. This sub-CA facilitated the interception of communicationssecured by Transport Layer Security (TLS). This update added theinvolved sub-CA certificate to OS X's list of untrusted certificates.CVE-IDCVE-2013-5134dyldAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: An attacker who has arbitrary code execution on a device maybe able to persist code execution across rebootsDescription: Multiple buffer overflows existed in dyld'sopenSharedCacheFile() function. These issues were addressed throughimproved bounds checking.CVE-IDCVE-2013-3950 : Stefan EsserFile SystemsAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: An attacker who can mount a non-HFS filesystem may be ableto cause an unexpected system termination or arbitrary code executionwith kernel privilegesDescription: A memory corruption issue existed in the handling ofAppleDouble files. This issue was addressed by removing support forAppleDouble files.CVE-IDCVE-2013-3955 : Stefan EsserImageIOAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Viewing a maliciously crafted PDF file may lead to anunexpected application termination or arbitrary code executionDescription: A buffer overflow existed in the handling of JPEG2000encoded data in PDF files. This issue was addressed throughadditional bounds checking.CVE-IDCVE-2013-1026 : Felix Groebert of the Google Security TeamIOKitAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Background applications could inject user interface eventsinto the foreground appDescription: It was possible for background applications to injectuser interface events into the foreground application using the taskcompletion or VoIP APIs. This issue was addressed by enforcing accesscontrols on foreground and background processes that handle interfaceevents.CVE-IDCVE-2013-5137 : Mackenzie Straight at Mobile LabsIOKitUserAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: A malicious local application could cause an unexpectedsystem terminationDescription: A null pointer dereference existed in IOCatalogue.The issue was addressed through additional type checking.CVE-IDCVE-2013-5138 : Will EstesIOSerialFamilyAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Executing a malicious application may result in arbitrarycode execution within the kernelDescription: An out of bounds array access existed in theIOSerialFamily driver. This issue was addressed through additionalbounds checking.CVE-IDCVE-2013-5139 : @dent1ztIPSecAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: An attacker may intercept data protected with IPSec HybridAuthDescription: The DNS name of an IPSec Hybrid Auth server was notbeing matched against the certificate, allowing an attacker with acertificate for any server to impersonate any other. This issue wasaddressed by improved certificate checking.CVE-IDCVE-2013-1028 : Alexander Traud of www.traud.deKernelAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: A remote attacker can cause a device to unexpectedly restartDescription: Sending an invalid packet fragment to a device cancause a kernel assert to trigger, leading to a device restart. Theissue was addressed through additional validation of packetfragments.CVE-IDCVE-2013-5140 : Joonas Kuorilehto of Codenomicon, an anonymousresearcher working with CERT-FI, Antti LevomAki and Lauri Virtanenof Vulnerability Analysis Group, StonesoftKernelAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: A malicious local application could cause device hangDescription: An integer truncation vulnerability in the kernelsocket interface could be leveraged to force the CPU into an infiniteloop. The issue was addressed by using a larger sized variable.CVE-IDCVE-2013-5141 : CESGKernelAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: An attacker on a local network can cause a denial of serviceDescription: An attacker on a local network can send speciallycrafted IPv6 ICMP packets and cause high CPU load. The issue wasaddressed by rate limiting ICMP packets before verifying theirchecksum.CVE-IDCVE-2011-2391 : Marc HeuseKernelAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Kernel stack memory may be disclosed to local usersDescription: An information disclosure issue existed in the msgctland segctl APIs. This issue was addressed by initializing datastructures returned from the kernel.CVE-IDCVE-2013-5142 : Kenzley Alphonse of Kenx Technology, IncKernelAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Unprivileged processes could get access to the contents ofkernel memory which could lead to privilege escalationDescription: An information disclosure issue existed in themach_port_space_info API. This issue was addressed by initializingthe iin_collision field in structures returned from the kernel.CVE-IDCVE-2013-3953 : Stefan EsserKernelAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Unprivileged processes may be able to cause an unexpectedsystem termination or arbitrary code execution in the kernelDescription: A memory corruption issue existed in the handling ofarguments to the posix_spawn API. This issue was addressed throughadditional bounds checking.CVE-IDCVE-2013-3954 : Stefan EsserKext ManagementAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: An unauthorized process may modify the set of loaded kernelextensionsDescription: An issue existed in kextd's handling of IPC messagesfrom unauthenticated senders. This issue was addressed by addingadditional authorization checks.CVE-IDCVE-2013-5145 : "Rainbow PRISM"libxmlAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Viewing a maliciously crafted web page may lead to anunexpected application termination or arbitrary code executionDescription: Multiple memory corruption issues existed in libxml.These issues were addressed by updating libxml to version 2.9.0.CVE-IDCVE-2011-3102 : Juri AedlaCVE-2012-0841CVE-2012-2807 : Juri AedlaCVE-2012-5134 : Google Chrome Security Team (Juri Aedla)libxsltAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Viewing a maliciously crafted web page may lead to anunexpected application termination or arbitrary code executionDescription: Multiple memory corruption issues existed in libxslt.These issues were addressed by updating libxslt to version 1.1.28.CVE-IDCVE-2012-2825 : Nicolas GregoireCVE-2012-2870 : Nicolas GregoireCVE-2012-2871 : Kai Lu of Fortinet's FortiGuard Labs, NicolasGregoirePasscode LockAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: A person with physical access to the device may be able tobypass the screen lockDescription: A race condition issue existed in the handling of phonecalls and SIM card ejection at the lock screen. This issue wasaddressed through improved lock state management.CVE-IDCVE-2013-5147 : videosdebarraquitoPersonal HotspotAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: An attacker may be able to join a Personal Hotspot networkDescription: An issue existed in the generation of Personal Hotspotpasswords, resulting in passwords that could be predicted by anattacker to join a user's Personal Hotspot. The issue was addressedby generating passwords with higher entropy.CVE-IDCVE-2013-4616 : Andreas Kurtz of NESO Security Labs and Daniel Metzof University Erlangen-NurembergPush NotificationsAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: The push notification token may be disclosed to an appcontrary to the user's decisionDescription: An information disclosure issue existed in pushnotification registration. Apps requesting access to the pushnotification access received the token before the user approved theapp's use of push notifications. This issue was addressed bywithholding access to the token until the user has approved access.CVE-IDCVE-2013-5149 : Jack Flintermann of Grouper, Inc.SafariAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a maliciously crafted website may lead to anunexpected application termination or arbitrary code executionDescription: A memory corruption issue existed in the handling ofXML files. This issue was addressed through additional boundschecking.CVE-IDCVE-2013-1036 : Kai Lu of Fortinet's FortiGuard LabsSafariAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: History of pages recently visited in an open tab may remainafter clearing of historyDescription: Clearing Safari's history did not clear theback/forward history for open tabs. This issue was addressed byclearing the back/forward history.CVE-IDCVE-2013-5150SafariAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Viewing files on a website may lead to script execution evenwhen the server sends a 'Content-Type: text/plain' headerDescription: Mobile Safari sometimes treated files as HTML fileseven when the server sent a 'Content-Type: text/plain' header. Thismay lead to cross-site scripting on sites that allow users to uploadfiles. This issue was addressed through improved handling of fileswhen 'Content-Type: text/plain' is set.CVE-IDCVE-2013-5151 : Ben Toews of GithubSafariAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a malicious website may allow an arbitrary URL tobe displayedDescription: A URL bar spoofing issue existed in Mobile Safari. Thisissue was addressed through improved URL tracking.CVE-IDCVE-2013-5152 : Keita Haga of keitahaga.com, Lukasz Pilorz of RBSSandboxAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Applications that are scripts were not sandboxedDescription: Third-party applications which used the #! syntax torun a script were sandboxed based on the identity of the scriptinterpreter, not the script. The interpreter may not have a sandboxdefined, leading to the application being run unsandboxed. This issuewas addressed by creating the sandbox based on the identity of thescript.CVE-IDCVE-2013-5154 : evad3rsSandboxAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Applications can cause a system hangDescription: Malicious third-party applications that wrote specificvalues to the /dev/random device could force the CPU to enter aninfinite loop. This issue was addressed by preventing third-partyapplications from writing to /dev/random.CVE-IDCVE-2013-5155 : CESGSocialAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Users recent Twitter activity could be disclosed on deviceswith no passcode.Description: An issue existed where it was possible to determinewhat Twitter accounts a user had recently interacted with. This issuewas resolved by restricting access to the Twitter icon cache.CVE-IDCVE-2013-5158 : Jonathan ZdziarskiSpringboardAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: A person with physical access to a device in Lost Mode maybe able to view notificationsDescription: An issue existed in the handling of notifications whena device is in Lost Mode. This update addresses the issue withimproved lock state management.CVE-IDCVE-2013-5153 : Daniel StangroomTelephonyAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Malicious apps could interfere with or control telephonyfunctionalityDescription: An access control issue existed in the telephonysubsystem. Bypassing supported APIs, sandboxed apps could makerequests directly to a system daemon interfering with or controllingtelephony functionality. This issue was addressed by enforcing accesscontrols on interfaces exposed by the telephony daemon.CVE-IDCVE-2013-5156 : Jin Han of the Institute for Infocomm Researchworking with Qiang Yan and Su Mon Kywe of Singapore ManagementUniversity; Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and WenkeLee from the Georgia Institute of TechnologyAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Sandboxed apps could send tweets without user interaction orpermissionDescription: An access control issue existed in the Twittersubsystem. Bypassing supported APIs, sandboxed apps could makerequests directly to a system daemon interfering with or controllingTwitter functionality. This issue was addressed by enforcing accesscontrols on interfaces exposed by the Twitter daemon.CVE-IDCVE-2013-5157 : Jin Han of the Institute for Infocomm Researchworking with Qiang Yan and Su Mon Kywe of Singapore ManagementUniversity; Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and WenkeLee from the Georgia Institute of TechnologyWebKitAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a maliciously crafted website may lead to anunexpected application termination or arbitrary code executionDescription: Multiple memory corruption issues existed in WebKit.These issues were addressed through improved memory handling.CVE-IDCVE-2013-0879 : Atte Kettunen of OUSPGCVE-2013-0991 : Jay Civelli of the Chromium development communityCVE-2013-0992 : Google Chrome Security Team (Martin Barbella)CVE-2013-0993 : Google Chrome Security Team (Inferno)CVE-2013-0994 : David German of GoogleCVE-2013-0995 : Google Chrome Security Team (Inferno)CVE-2013-0996 : Google Chrome Security Team (Inferno)CVE-2013-0997 : Vitaliy Toropov working with HP's Zero Day InitiativeCVE-2013-0998 : pa_kt working with HP's Zero Day InitiativeCVE-2013-0999 : pa_kt working with HP's Zero Day InitiativeCVE-2013-1000 : Fermin J. Serna of the Google Security TeamCVE-2013-1001 : Ryan HumenickCVE-2013-1002 : Sergey GlazunovCVE-2013-1003 : Google Chrome Security Team (Inferno)CVE-2013-1004 : Google Chrome Security Team (Martin Barbella)CVE-2013-1005 : Google Chrome Security Team (Martin Barbella)CVE-2013-1006 : Google Chrome Security Team (Martin Barbella)CVE-2013-1007 : Google Chrome Security Team (Inferno)CVE-2013-1008 : Sergey GlazunovCVE-2013-1010 : miaubizCVE-2013-1037 : Google Chrome Security TeamCVE-2013-1038 : Google Chrome Security TeamCVE-2013-1039 : own-hero Research working with iDefense VCPCVE-2013-1040 : Google Chrome Security TeamCVE-2013-1041 : Google Chrome Security TeamCVE-2013-1042 : Google Chrome Security TeamCVE-2013-1043 : Google Chrome Security TeamCVE-2013-1044 : AppleCVE-2013-1045 : Google Chrome Security TeamCVE-2013-1046 : Google Chrome Security TeamCVE-2013-1047 : miaubizCVE-2013-2842 : Cyril CattiauxCVE-2013-5125 : Google Chrome Security TeamCVE-2013-5126 : AppleCVE-2013-5127 : Google Chrome Security TeamCVE-2013-5128 : AppleWebKitAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a malicious website may lead to informationdisclosureDescription: An information disclosure issue existed in the handlingof the window.webkitRequestAnimationFrame() API. A maliciouslycrafted website could use an iframe to determine if another site usedwindow.webkitRequestAnimationFrame(). This issue was addressedthrough improved handling of window.webkitRequestAnimationFrame().CVE-IDCVE-2013-5159WebKitAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Copying and pasting a malicious HTML snippet may lead to across-site scripting attackDescription: A cross-site scripting issue existed in the handling ofcopied and pasted data in HTML documents. This issue was addressedthrough additional validation of pasted content.CVE-IDCVE-2013-0926 : Aditya Gupta, Subho Halder, and Dev Kar of xys3c(xysec.com)WebKitAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a maliciously crafted website may lead to a cross-site scripting attackDescription: A cross-site scripting issue existed in the handling ofiframes. This issue was addressed through improved origin tracking.CVE-IDCVE-2013-1012 : Subodh Iyengar and Erling Ellingsen of FacebookWebKitAvailable for: iPhone 3GS and later,iPod touch (4th generation) and later, iPad 2 and laterImpact: Visiting a maliciously crafted website may lead to aninformation disclosureDescription: An information disclosure issue existed in XSSAuditor.This issue was addressed through improved handling of URLs.CVE-IDCVE-2013-2848 : Egor HomakovWebKitAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Dragging or pasting a selection may lead to a cross-sitescripting attackDescription: Dragging or pasting a selection from one site toanother may allow scripts contained in the selection to be executedin the context of the new site. This issue is addressed throughadditional validation of content before a paste or a drag and dropoperation.CVE-IDCVE-2013-5129 : Mario HeiderichWebKitAvailable for: iPhone 4 and later,iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a maliciously crafted website may lead to a cross-site scripting attackDescription: A cross-site scripting issue existed in the handling ofURLs. This issue was addressed through improved origin tracking.CVE-IDCVE-2013-5131 : Erling A Ellingsen
You see it is a pretty long list.