iOS 6.1.3 update

iOS 6.1.3 update images from my phone doing a screen shot. For previous reviews of the other updates go here. This update is more for security reasons and solved an issue of getting into a locked phone.

Information on the security impact of this update can been reviewed below. Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn about other Security Updates, see “Apple Security Updates”.

iOS 6.1.3 update break down:

Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

Impact: A local user may be able to execute unsigned code

Description: A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed by refusing to load an executable with overlapping segments.

CVE-ID

CVE-2013-0977 : evad3rs

Kernel

Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

Impact: A local user may be able to determine the address of structures in the kernel

Description: An information disclosure issue existed in the ARM prefetch abort handler. This issue was addressed by panicking if the prefetch abort handler is not being called from an abort context.

CVE-ID

CVE-2013-0978 : evad3rs

Lockdown

Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

Impact: A local user may be able to change permissions on arbitrary files

Description: When restoring from backup, lockdownd changed permissions on certain files even if the path to the file included a symbolic link. This issue was addressed by not changing permissions on any file with a symlink in its path.

CVE-ID

CVE-2013-0979 : evad3rs

Passcode Lock

Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

Impact: A person with physical access to the device may be able to bypass the screen lock

Description: A logic issue existed in the handling of emergency calls from the lock screen. This issue was addressed through improved lock state management.
CVE-ID

CVE-2013-0980 : Christopher Heffley of theMedium.ca, videosdebarraquito

USB

Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

Impact: A local user may be able to execute arbitrary code in the kernel

Description: The IOUSBDeviceFamily driver used pipe object pointers that came from userspace. This issue was addressed by performing additional validation of pipe object pointers.

CVE-ID

CVE-2013-0981 : evad3rs

WebKit

Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later

Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution

Description: An invalid cast issue existed in the handling of SVG files. This issue was addressed through improved type checking.

Now it’s time to perform the update and test your device. Keep in mind to be conscious of battery life, phone storage and wi-fi connections during any updates!

iOS 6.1.3 update.jpg

iOS 6.1.3
This update contains improvements and other bug fixes including:
Fixes a bug that could allow someone to bypass the passcode and access the Phone app
Improvements to Maps in Japan
For information on the security content of this update, please visit this website:
https://support.apple.com/kb/HT1222

iOS 6.1.3 update information.jpg
Some other questions about the alarm clock song removals are still not updated at this time.
20130322-101114.jpg
Stay tuned, and check back to see the testing of iOS 6.1.3 on my iPhone 4S ‘!
Some other articles about previous updates can be found here on iOS .
So update your phones today to iOS 6.1.3 and let the community know your experience. Are you seeing better battery performance?

2 Comments on “iOS 6.1.3 update

Leave a Reply