coretext

CoreText exploit analyzed

An analysis has been conducted on the recently-uncovered CoreText exploit, to determine exactly how it worked. The expolit crashed apps when malicious text messages and emails were opened on iOS devices and Macs. The exploit had to do with negative-length strings, according to The Register

More →

5
loading...
2
loading...
34
loading...
0
loading...

What you need to know about the CoreText exploit that can crash iOS and OS X apps

An exploit in CoreText, the font rendering framework in current, publicly available versions of iOS and OS X, has been discovered that, if displayed, will crash apps. According to habrahabr.ru, it can be remotely triggered via SMS or iMessage, Safari, and even the ESSID of a Wi-Fi network when scanning for and displaying them. Our security editor, Nick Arnott, has been looking into this morning and shared the following:

More →

3
loading...
0
loading...
40
loading...
0
loading...