PDA

توجه ! این یک نسخه آرشیو شده میباشد و در این حالت شما عکسی را مشاهده نمیکنید برای مشاهده کامل متن و عکسها بر روی لینک مقابل کلیک کنید : ios7.1.1منتشر شد



A.W.A.T
2014_04_23, 11:42
Here’s the list of changes according to the release notes:

-Further improvements to Touch ID fingerprint recognition
-Fixes a bug that could impact keyboard responsiveness
-Fixes an issue when using Bluetooth keyboards with VoiceOver enabled

Warning to Jailbreakers

Just like iOS 7.1, jailbreakers should avoid upgrading to iOS 7.1.1 until further notice as you will lose the jailbreak and won’t be able to jailbreak your device




Apple TV 2G (AppleTV2,1) version ۶٫۱٫۱ (Build 11D201c), Download ([Only registered and activated users can see links])
[*=right]Apple TV 3G (AppleTV3,1) version ۶٫۱٫۱ (Build 11D201c), Download ([Only registered and activated users can see links])
AppleTV3,2 (AppleTV3,2) version ۶٫۱٫۱ (Build 11D201c), Download ([Only registered and activated users can see links])
[*=right]iPad 2 (Wi-Fi) (iPad2,1) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad 2 (GSM) (iPad2,2) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad 2 (CDMA) (iPad2,3) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad2,4 (iPad2,4) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad Mini (Wi-Fi) (iPad2,5) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad Mini (GSM) (iPad2,6) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad Mini (CDMA) (iPad2,7) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad 3 (Wi-Fi) (iPad3,1) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad 3 (GSM) (iPad3,2) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad 3 (CDMA) (iPad3,3) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad 4 (Wi-Fi) (iPad3,4) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad 4 (GSM) (iPad3,5) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad 4 (CDMA) (iPad3,6) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad4,1 (iPad4,1) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad4,2 (iPad4,2) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad4,3 (iPad4,3) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad4,4 (iPad4,4) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad4,5 (iPad4,5) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPad4,6 (iPad4,6) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPhone 4 (GSM) (iPhone3,1) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPhone 4 (GSM) (2012) (iPhone3,2) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPhone 4 (CDMA) (iPhone3,3) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPhone 4S (iPhone4,1) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPhone 5 (GSM) (iPhone5,1) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPhone 5 (CDMA) (iPhone5,2) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPhone5,3 (iPhone5,3) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPhone5,4 (iPhone5,4) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPhone6,1 (iPhone6,1) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPhone6,2 (iPhone6,2) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])
iPod touch 5G (iPod5,1) version ۷٫۱٫۱ (Build 11D201), Download ([Only registered and activated users can see links])

mehrdad_samavat
2014_04_23, 11:54
iOS 7.1.1



[*=left] CFNetwork [Only registered and activated users can see links]
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: An attacker in a privileged network position can obtain web site credentials
Description: Set-Cookie HTTP headers would be processed even if the connection closed before the header line was complete. An attacker could strip security settings from the cookie by forcing the connection to close before the security settings were sent, and then obtain the value of the unprotected cookie. This issue was addressed by ignoring incomplete HTTP header lines.
CVE-ID
CVE-2014-1296 : Antoine Delignat-Lavaud of Prosecco at Inria Paris



[*=left] IOKit Kernel
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A local user can read kernel pointers, which can be used to bypass kernel address space layout randomization
Description: A set of kernel pointers stored in an IOKit object could be retrieved from userland. This issue was addressed through removing the pointers from the object.
CVE-ID
CVE-2014-1320 : Ian Beer of Google Project Zero working with HP's Zero Day Initiative



[*=left] Security - Secure Transport
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: An attacker with a privileged network position may capture data or change the operations performed in sessions protected by SSL
Description: In a 'triple handshake' attack, it was possible for an attacker to establish two connections which had the same encryption keys and handshake, insert the attacker's data in one connection, and renegotiate so that the connections may be forwarded to each other. To prevent attacks based on this scenario, Secure Transport was changed so that, by default, a renegotiation must present the same server certificate as was presented in the original connection.
CVE-ID
CVE-2014-1295 : Antoine Delignat-Lavaud, Karthikeyan Bhargavan and Alfredo Pironti of Prosecco at Inria Paris



[*=left] WebKit
Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.
CVE-ID
CVE-2013-2871 : miaubiz
CVE-2014-1298 : Google Chrome Security Team
CVE-2014-1299 : Google Chrome Security Team, Apple, Renata Hodovan of University of Szeged / Samsung Electronics
CVE-2014-1300 : Ian Beer of Google Project Zero working with HP's Zero Day Initiative
CVE-2014-1302 : Google Chrome Security Team, Apple
CVE-2014-1303 : KeenTeam working with HP's Zero Day Initiative
CVE-2014-1304 : Apple
CVE-2014-1305 : Apple
CVE-2014-1307 : Google Chrome Security Team
CVE-2014-1308 : Google Chrome Security Team
CVE-2014-1309 : cloudfuzzer
CVE-2014-1310 : Google Chrome Security Team
CVE-2014-1311 : Google Chrome Security Team
CVE-2014-1312 : Google Chrome Security Team
CVE-2014-1313 : Google Chrome Security Team
CVE-2014-1713 : VUPEN working with HP's Zero Day Initiative