Apple Blocks TaiG Jailbreak With iOS 8.1.3

Apple Blocks TaiG Jailbreak With iOS 8.1.3

Posted by · 30502 views · Translate
Apple has blocked the TaiG jailbreak with the release of iOS 8.1.3, according to security documents first spotted by iClarified.

A total of four exploits have been closed and credited to the TaiG Jailbreak Team.

-----
AppleFileConduit
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A maliciously crafted afc command may allow access to protected parts of the filesystem
● Description: A vulnerability existed in the symbolic linking mechanism of afc. This issue was addressed by adding additional path checks.
● CVE-2014-4480 : TaiG Jailbreak Team

dyld
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A local user may be able to execute unsigned code
● Description: A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed through improved validation of segment sizes.
● CVE-2014-4455 : TaiG Jailbreak Team

IOHIDFamily
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A malicious application may be able to execute arbitrary code with system privileges
● Description: A buffer overflow existed in IOHIDFamily. This issue was addressed through improved size validation.
● CVE-2014-4487 : TaiG Jailbreak Team

Kernel
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: Maliciously crafted or compromised iOS applications may be able to determine addresses in the kernel
● Description: The mach_port_kobject kernel interface leaked kernel addresses and heap permutation value, which may aid in bypassing address space layout randomization protection. This was addressed by disabling the mach_port_kobject interface in production configurations.
● CVE-2014-4496 : TaiG Jailbreak Team
-----

In addition to closing these vulnerabilities used by TaiG, Apple has closed another kernel vulnerability used by PanguTeam and Stefan Esser.

------
Kernel
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: Maliciously crafted or compromised iOS applications may be able to determine addresses in the kernel
● Description: An information disclosure issue existed in the handling of APIs related to kernel extensions. Responses containing an OSBundleMachOHeaders key may have included kernel addresses, which may aid in bypassing address space layout randomization protection. This issue was addressed by unsliding the addresses before returning them.
● CVE-2014-4491 : @PanguTeam, Stefan Esser
-----

If you still want to jailbreak your device, the iOS 8.1.2 signing window is still open. You have a very limited amount of time to restore to the iOS 8.1.2 and jailbreak. See the iClarified Jailbreak Wizard for details.

Please follow iClarified on Twitter, Facebook, Google+, or RSS for more Apple news, tutorials, and videos.


Apple Blocks TaiG Jailbreak With iOS 8.1.3
Jonas iPhone - January 31, 2015 at 11:09am
The Pangu team just released the new version 1.3.0 of their jailbreaking tool. This new version also supports iOS 8.1.3 so no need to downgrade! :) Download it from their official blog http://pangujb.blogspot.com/
Dang The Hung - February 3, 2015 at 2:17am
That is a fake bullshit link. Spammers like you need to have your nuts snatched off and used for dice. BEWARE don't click on Jonas link, It will redirect you to adware and survey sites.
Jackson Browne - January 28, 2015 at 5:38pm
Jailbreaking is fine. However, when the security exploits that are needed are announced to everyone in the world (which has to happen when a jailbreaking tool is released), then Apple has no choice but to patch the holes. Just the way it is.
Aubry - February 17, 2015 at 5:17pm
Get
Aubry - February 17, 2015 at 5:18pm
Gdg
15 More Comments
Recent