When Apple releases a major update like yesterday’s iOS 8.1.3, it’s usual for the company’s coders to fix (or, in other words, break) all known jailbreak exploits.
Not so surprisingly, the latest update is no different. It fixes several exploits that are necessary to run the iOS 8.1.2 jailbreak. But in a classy move, at least Apple gave a hat tip to the jailbreak team for calling their attention to the exploits.
As you might recall, Chinese jailbreaking team TaiG was responsible for the iOS 8.1.2 jailbreak.
Apple apparently took notice of their work, because on a support page for the new iOS 8.1.3, Cupertino calls out the TaiG Jailbreak Team by name for helping them fix the following bugs:
AppleFileConduit
Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A maliciously crafted afc command may allow access to protected parts of the filesystem
Description: A vulnerability existed in the symbolic linking mechanism of afc. This issue was addressed by adding additional path checks.
CVE-ID
CVE-2014-4480 : TaiG Jailbreak Team
dyld
Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A local user may be able to execute unsigned code
Description: A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed through improved validation of segment sizes.
CVE-ID
CVE-2014-4455 : TaiG Jailbreak Team
IOHIDFamily
Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A malicious application may be able to execute arbitrary code with system privileges
Description: A buffer overflow existed in IOHIDFamily. This issue was addressed through improved size validation.
CVE-ID
CVE-2014-4487 : TaiG Jailbreak Team
Kernel
Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: Maliciously crafted or compromised iOS applications may be able to determine addresses in the kernel
Description: The mach_port_kobject kernel interface leaked kernel addresses and heap permutation value, which may aid in bypassing address space layout randomization protection. This was addressed by disabling the mach_port_kobject interface in production configurations.
CVE-ID
CVE-2014-4496 : TaiG Jailbreak Team
With these exploits fixed, it’s only a matter of time before TaiG (or other teams) find new exploits to jailbreak. My guess is when Apple fixes those, they’ll be classy enough to credit the jailbreakers too.
Source: Apple
Via: iDownloadBlog