| Deutsch English Français Italiano |
|
<10133m9$28not$2@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!news.quux.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!eternal-september.org!.POSTED!not-for-mail From: Alan <nuh-uh@nope.com> Newsgroups: misc.phone.mobile.iphone,comp.mobile.ipad,comp.sys.mac.system Subject: Re: Three zero-days within months - Apple is on a roll for zero-day bugs in 2025 Date: Mon, 26 May 2025 18:14:49 -0700 Organization: A noiseless patient Spider Lines: 26 Message-ID: <10133m9$28not$2@dont-email.me> References: <100r94g$1kd2$1@nnrp.usenet.blueworldhosting.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Tue, 27 May 2025 03:14:50 +0200 (CEST) Injection-Info: dont-email.me; posting-host="c13c9451ee966f02e6e7acd561d150b4"; logging-data="2383645"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19rXLEu4gIPAiHNRVL0qYY3PKlBYkcr8Ek=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:EFpjIKFk9iKx4+tuC6kZtFhBTmk= Content-Language: en-CA In-Reply-To: <100r94g$1kd2$1@nnrp.usenet.blueworldhosting.com> Bytes: 2296 On 2025-05-23 18:58, Marion wrote: > *Three zero-days within months!* > <https://www.csoonline.com/article/3843999/apple-patches-zero-day-bugs-used-in-targeted-iphone-attacks.html> > > The company suffered a total of twenty zero-day holes in 2023, including > the actively exploited RCE bugs, CVE-2023-32434 and CVE-2023-32435. > > In 2024, Apple fixed six zero-day bugs, along with a string of critical > flaws including CVE-2024-23225 and CVE-2024-23296 which together allowed > attackers to bypass kernel memory protection. > > This marks Apple's third zero-day fix since the start of the year, > following patches for CVE-2025-24085 in January and CVE-2025-24200 in > February. > > Surprise! While Android has *never* had a Pegasus kernel exploit, iOS > constantly has them, in addition to the termite-ridden WebKit abomination. Interesting your very careful phrasing there: "Pegasus KERNEL exploit"... 'Pegasus for Android Pegasus for Android is the Android version of malware that has reportedly been linked to the NSO Group.' <https://attack.mitre.org/software/S0316/>