Radware said that the phone is vulnerable to DoS attacks owing to a design flaw that may be triggered by a series of memory allocation operations on the dynamic memory pool, which in turn triggers a bug in the garbage collector.
"While vendors are struggling to push new products and applications, it is evident that security still remains a secondary concern," said Itzik Kotler, security operation centre manager at Radware.
"Hackers continue to misappropriate other people's software and their job is made easier by design flaws embedded into software products."
To exploit the vulnerability, an iPhone user must open an HTML page which contains JavaScript that manifests this vulnerability.
Once at the site, an application-level DoS attack crashes the Safari browser and could go as far as crashing the iPhone completely.
Users could be lured to sites containing this attack via links in spam messages or other social engineering techniques.
Radware said that the vulnerability is a proof of concept, and looks like little more than a nuisance at this stage.
However, the firm believes that there is a possibility that a more sophisticated hacker could use vulnerabilities like this to shut services down or install malware.
iPhone vulnerable to DoS attack
By
Staff Writers
on Apr 19, 2008 8:10AM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

Build cybersecurity capability with award winning Fortinet training from Ingram Micro

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Kaseya Dattocon APAC 2024 is Back

Tech For Good program gives purpose and strong business outcomes
Ingram Micro Ushers in the Age of Ultra
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report