{"id":1319,"date":"2011-11-20T23:28:18","date_gmt":"2011-11-20T21:28:18","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=1319"},"modified":"2011-11-20T23:28:18","modified_gmt":"2011-11-20T21:28:18","slug":"une-faille-de-securite-permet-de-controler-un-iphone-a-distance","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=1319","title":{"rendered":"Une faille de s\u00e9curit\u00e9 permet de contr\u00f4ler un iPhone \u00e0 distance"},"content":{"rendered":"<p style=\"text-align: justify;\">Comme tout syst\u00e8me informatique, l\u2019iPhone est vuln\u00e9rable aux failles de son OS et aux attaques et notamment aux chevaux de Troie. C\u2019est ce qu\u2019a cherch\u00e9 \u00e0 d\u00e9montrer Charlie Miller avec son application Instastock. Cette menace concerne tous les syst\u00e8mes, non seulement les iPhones mais aussi les PC, Mac, Android\u2026 L\u2019insertion d\u2019un code malicieux au sein d\u2019un programme est tr\u00e8s difficile \u00e0 d\u00e9celer ; ceci doit inciter l\u2019utilisateur \u00e0 la plus grande prudence dans la provenance de ses applications. B. R.<\/p>\n<p style=\"text-align: justify;\">Extrait de l\u2019article publi\u00e9 sur Degroupnews.com :<\/p>\n<p style=\"text-align: justify;\"><em>Les iPhone et iPad ne sont pas \u00e0 l&#8217;abri des failles. Charlie Miller, un chercheur en s\u00e9curit\u00e9 informatique, a mis en \u00e9vidence une nouvelle vuln\u00e9rabilit\u00e9 d&#8217;iOS permettant de prendre le contr\u00f4le d&#8217;un terminal \u00e0 l&#8217;insu de l&#8217;utilisateur gr\u00e2ce \u00e0 un code malicieux cach\u00e9 dans une application.<\/em><\/p>\n<p style=\"text-align: justify;\"><em>Ce n&#8217;est pas la premi\u00e8re fois que Charlie Miller met en lumi\u00e8re une faille sur les terminaux d&#8217;Apple. Cet ancien de la NSA, sp\u00e9cialiste en s\u00e9curit\u00e9 informatique, avait d\u00e9j\u00e0 r\u00e9v\u00e9l\u00e9 une vuln\u00e9rabilit\u00e9 de l&#8217;iPhone. Gr\u00e2ce \u00e0 un SMS sp\u00e9cial, il \u00e9tait possible d&#8217;\u00e9couter les conversations sur le t\u00e9l\u00e9phone ou d&#8217;en prendre le contr\u00f4le. Cette fois-ci, le chercheur pointe du doigt un d\u00e9faut de s\u00e9curit\u00e9 avec une application.<\/em><\/p>\n<p style=\"text-align: justify;\"><em>La m\u00e9thode utilis\u00e9e est en fait assez simple. Il existe une faille de s\u00e9curit\u00e9 dans Nitro, le moteur Javascript du navigateur Safari pr\u00e9sent sur iOS. Cette br\u00e8che permet d&#8217;ex\u00e9cuter du code non sign\u00e9 sans que l&#8217;iPhone ou l&#8217;iPad ne bronche. En r\u00e9sum\u00e9, il suffit qu&#8217;une personne mal intentionn\u00e9e cache une action nocive dans une application pour prendre le contr\u00f4le complet du terminal.<\/em><\/p>\n<p style=\"text-align: justify;\"><em>Charlie Miller est d&#8217;ailleurs pass\u00e9 de la th\u00e9orie \u00e0 la pratique. Il a cr\u00e9\u00e9 une application appel\u00e9e Instastock permettant de suivre le cours de la bourse en direct mais il a inclus un code malicieux permettant d&#8217;exploiter la fameuse faille. Il a soumis l&#8217;application en question \u00e0 Apple qui l&#8217;a valid\u00e9e sans le moindre probl\u00e8me.<\/em><\/p>\n<p style=\"text-align: justify;\"><em>Du coup, les terminaux Apple sur lesquels l&#8217;application est install\u00e9e peuvent \u00eatre la cible de nombreuses actions (exploration des dossiers, ajout et suppression de fichiers, vibration du terminal, t\u00e9l\u00e9chargement du carnet de contacts&#8230;) sans que l&#8217;utilisateur ne s&#8217;en rende compte. [\u2026]<\/em><\/p>\n<p style=\"text-align: justify;\"><em>Cet exemple montre une nouvelle fois que le syst\u00e8me mis en place par Apple pour la publication des applications n&#8217;est pas exempt de d\u00e9fauts. Pour l&#8217;instant, les seules r\u00e9ponses apport\u00e9es par la firme \u00e0 la pomme sont la suppression de l&#8217;application Instastock de l&#8217;App Store et l&#8217;exclusion de Charlie Miller de la communaut\u00e9 des d\u00e9veloppeurs iOS. Il reste maintenant \u00e0 savoir si une mise \u00e0 jour d&#8217;iOS est pr\u00e9vue pour colmater cette faille rapidement.<\/em><\/p>\n<p style=\"text-align: justify;\">Pour lire l\u2019article complet : <a href=\"http:\/\/www.degroupnews.com\/actualite\/n6967-iphone-ipad-faille-securite-apple.html\">http:\/\/www.degroupnews.com\/actualite\/n6967-iphone-ipad-faille-securite-apple.html<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Une%20faille%20de%20s%C3%A9curit%C3%A9%20permet%20de%20contr%C3%B4ler%20un%20iPhone%20%C3%A0%20distance\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>Comme tout syst\u00e8me informatique, l\u2019iPhone est vuln\u00e9rable aux failles de son OS et aux attaques et notamment aux chevaux de Troie. C\u2019est ce qu\u2019a cherch\u00e9 \u00e0 d\u00e9montrer Charlie Miller avec son application Instastock. Cette menace concerne tous les syst\u00e8mes, non seulement les iPhones mais aussi les PC, Mac, Android\u2026 L\u2019insertion d\u2019un code malicieux au sein &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=1319\" class=\"more-link\">Continue reading &lsquo;Une faille de s\u00e9curit\u00e9 permet de contr\u00f4ler un iPhone \u00e0 distance&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Une%20faille%20de%20s%C3%A9curit%C3%A9%20permet%20de%20contr%C3%B4ler%20un%20iPhone%20%C3%A0%20distance\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[35,30],"tags":[505,604,603,599,601,99,600,598,501,146,25,602,597,1628,317],"class_list":["post-1319","post","type-post","status-publish","format-standard","hentry","category-securite-informatique","category-sites-internet","tag-acces-a-distance","tag-app-store","tag-apple","tag-charlie-miller","tag-code-malicieux","tag-faille-de-securite","tag-instastock","tag-ios","tag-iphone","tag-malveillance","tag-nouvelles-technologies","tag-nsa","tag-os","tag-securite-informatique","tag-sensibilisation-des-utilisateurs"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1319"}],"version-history":[{"count":0,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1319\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}