Apple has responded to questions raised by pod2g earlier this week over an SMS vulnerability he discovered in the latest iOS 6 beta 4. The SMS vulnerability could allow someone to abuse the protocol for SMS in order to spoof or send fake text messages. The exploit has been an issue since the incarnation of iOS and is still present in iOS 6 beta 4.
pod2g has just published a blog regarding an SMS vulnerability he's found in iOS that could allow someone to abuse the protocol for SMS in order to spoof or send fake text messages. The exploit has been an issue since the incarnation of iOS and is still present in iOS 6 beta 4.
The untethered iOS 5.1.1 jailbreak should be released in just a matter of days according to a tweet by pod2g. Many people have been eagerly awaiting an untethered jailbreak for the latest version of iOS 5.1.1. It has taken a while for it to even look possible never mind become available.
With the last update regarding the yet to be released iPhone 4S and iPad 2 jailbreak coming to us from pod2g, we learned that a “dream team” had been assembled to help tackle a sandboxing issue in the Apple A5, now the latest information is brought to everyone via Planetbeing where he took to Twitter to note:
Notorious iPhone hacker pod2g has updated the community letting everyone know a jailbreak "dream team" has been assembled to help tackle a sandboxing issue in the Apple A5, a vital part of the exploitation process necessary for an iPhone 4S and iPad 2 jailbreak.
Pod2g has decided to share a little more information on the hopefully soon to be released iPhone 4S and iPad 2 jailbreak. In a blog post, pod2g has answered a couple of questions that may have been on your mind as you await its release. One of the questions is how he has managed to get an untethered 4S and dev teams still haven’t released tools to achieve this at home?
pod2g has updated his blog with more details on how the Corona untether actually works. If the deep inner workings of exploits such as this interest you, it's definitely something you'll want to check out.
Using a fuzzer, I found after some hours of work that there's a format string vulnerability in the racoon configuration parsing code! racoon is the IPsec IKE daemon (http://ipsec-tools.sourceforge.net/). It comes by default with iOS and is started when you setup an IPsec connection.
Now you got it, Corona is an anagram of racoon :-) .
While jailbreaking already provides tons of functionality, there's still room for improvement and expansion in 2012. Last year I did a list of jailbreak concepts Apple should implement and low and behold, they implemented quite a few of them. But that's part of the game. Part of what spurs more innovation is creativity and pushing boundaries. And at the end of the day it's really the user base that is the most useful when it comes to helping developers out. They can't create it if they don't know we want it. So this is our list of the top 5 things we'd like to see jailbreak accomplish in 2012.
Heard about the untethered jailbreak for the original iPad, iPhone 4, iPod touch 4, and older models running iOS 5.0.1 and curious how to use it on your own device?. This jailbreak won't yet work with newer, Apple A5 chipset-powered devices, namely the iPhone 4S or iPad 2, but if you own anything earlier, you're in luck.