Pod2G has found another exploit for the iPod touch 2G that may be used to provide a jailbreak for both MC and non-MC models.
A heap overflow exists in the iPod touch 2G (both old and new) bootrom's DFU Mode when sending a USB control message of request type 0xA1, request 0x1.
On newer devices, the same USB message triggers a double free() when the image upload is marked as finished, also rebooting the device (but that's not exploitable because the double free() happens in a row). posixninja analyzed and explained this one.
This exploit is different from the one being used for the SHAtter jailbreak.
Would you like to be notified when someone replies or adds a new comment?
Yes (All Threads)
Yes (This Thread Only)
No
Notifications
Would you like to be notified when we post a new Apple news article or tutorial?
Yes
No
Comments (4)
Comments are closed for this article.
0
Tom - September 21, 2010 at 4:46pm
Why is he publishing details of this? Surely Apple will just fix it so it won't be of any use in future iOS releases?
0
noidea - September 21, 2010 at 3:01pm
I just wanted to ask whether there is a difference between the iPod Touch 2G and 3G when it comes to jailbreaking. Also maybe how to tell the difference between the two models. I believe I have a 3G but then again, I'm not certain haha. Please help.
0
Nick Walker - September 21, 2010 at 1:31pm
Pleasedon't use the term "homie"; it makes you sound like an utter twat.
0
ikkviper@gmail.com - September 21, 2010 at 12:50pm
Damn. This dude is on a roll. Keep up the good work homie. :-)