Wednesday, May 22, 2024

Critical Bug:Single MMS Can Crash Message application On IOS

A solitary instant message could be abused to impair the Messages application on any iPhone because of an as of late found bug.

The bug defect makes the Apple Message application inoperable, making it difficult to pursue instant messages or iMessages.

The defect is not kidding, the application will keep on crashing inspite of when the client closes it or reboot the gadget.

Critical Bug: Single MMS Can Crash Message application On IOS

Steps to be followed:

  • Download the file here.
  • Upload it to iCloud Drive, Dropbox etc.. (just if you want to keep it).
  • Share the file to send it via Message
  • Send it to your victim.
  • Wait for the victim click on it, the Message application freeze and don’t work anymore.
  • Fix the app with this magical link

When you click, iOS want to read the text, the text in the file is very complicated for the system and cause a CPU average: the app freeze. You close the app, want to reopen but iOS want to reload the earlier message but can’t because it’s the vcf file.

The bug is like the “Successful Power” found in May 2015, when clients saw that an instant message containing a string of Arabic content would crash telephones.

Back to the present, there is an uplifting news for those clients that have gotten the malignant message.

There no less than two workarounds to expel the message from the highest point of the inbox:

To Download the Code and recommended Fix

VCF file:

Fix link:

Another fix: See the post on Twitter

Another fix 2: See the post on Twitter

Critical Bug:Single MMS Can Crash Message application On IOS

By sending yourself a message in Siri, or ask someone else to send you a message.

Once the message is received the Messages app will allow you to open the new message instead of the malicious one.

There is by all accounts an issue with some iPad where the settle does not work, you can attempt interchange settle.

Critical Bug:Single MMS Can Crash Message application On IOS

Latest articles

Cloud-Based Malware Attack Abusing Google Drive & Dropbox

A phishing email with a malicious zip attachment initiates the attack. The zip contains...

OmniVision Technologies Cyber Attack, Hackers Stolen Personal Data in Ransomware Attack

OmniVision Technologies, Inc. (OVT) recently disclosed a significant security breach that compromised its clients'...

Critical Flaw In Confluence Server Let Attackers Execute Arbitrary Code

The widely used team workspace corporate wiki Confluence has been discovered to have a...

Threat Actors Leverage Bitbucket Artifacts to Breach AWS Accounts

In a recent investigation into Amazon Web Services (AWS) security breaches, Mandiant uncovered a...

Hackers Breached Western Sydney University Microsoft 365 & Sharepoint Environments

Western Sydney University has informed approximately 7,500 individuals today of an unauthorized access incident...

Memcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From Digital Impersonation Fraud

Memcyco Inc., provider of digital trust technology designed to protect companies and their customers...

DoppelGänger Attack: Malware Routed Via News Websites And Social Media

A Russian influence campaign, DoppelGänger, leverages fake news websites (typosquatted and independent) to spread...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles