Apple has just released iOS 4.3.5 for the iPhone, iPad and iPod touch. This update comes just days after the iOS 4.3.4 release and it resolves a “security issue” which has been resolved with certificate verification.

Standalone downloads and geeky specifics below:

iOS Firmware

device current version date found
AppleTV(2G) (AppleTV2,1) 4.2.2 (8F305) 05/11/2011 16:06:01
iPad (iPad1,1) 4.3.5 (8L1) 07/25/2011 13:31:01
iPad2,1 (iPad2,1) 4.3.5 (8L1) 07/25/2011 13:31:01
iPad2,2 (iPad2,2) 4.3.5 (8L1) 07/25/2011 13:31:01
iPad2,3 (iPad2,3) 4.3.5 (8L1) 07/25/2011 13:31:01
iPhone (iPhone1,1) 3.1.3 (7E18) 04/08/2010 21:05:48
iPhone3G (iPhone1,2) 4.2 (8C148) 11/22/2010 13:08:57
iPhone3GS (iPhone2,1) 4.3.5 (8L1) 07/25/2011 13:31:01
iPhone4 (iPhone3,1) 4.3.5 (8L1) 07/25/2011 13:31:01
iPhone4(vz) (iPhone3,3) 4.2.10 (8E600) 07/25/2011 13:31:01
iPodTouch(2G) (iPod2,1) 4.2 (8C148) 11/22/2010 13:08:57
iPodTouch(3G) (iPod3,1) 4.3.5 (8L1) 07/25/2011 13:31:01
iPodTouch(4G) (iPod4,1) 4.3.5 (8L1) 07/25/2011 13:31:01
last updated: 07/25/2011 13:38:01 EDT

From Apple’s KB:

This document describes the security content of iOS 4.3.5, which can be downloaded and installed using iTunes.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see “How to use the Apple Product Security PGP Key.”

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see “Apple Security Updates“.

Products Affected

iPad, iPod touch (3rd generation), iPhone 4, iPod touch (4th generation), iPhone 3GS, Product Security

iOS 4.3.5 Software Update

  • Data SecurityAvailable for: iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM), iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later, iOS 3.2 through 4.3.4 for iPad

    Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS

    Description: A certificate chain validation issue existed in the handling of X.509 certificates. An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS. Other attacks involving X.509 certificate validation may also be possible. This issue is addressed through improved validation of X.509 certificate chains.

    CVE-ID

    CVE-2011-0228 : Gregor Kopf of Recurity Labs on behalf of BSI, and Paul Kehrer of Trustwave’s SpiderLabs

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s