Pod2G has found another exploit for the iPod touch 2G that may be used to provide a jailbreak for both MC and non-MC models.
A heap overflow exists in the iPod touch 2G (both old and new) bootrom's DFU Mode when sending a USB control message of request type 0xA1, request 0x1.
On newer devices, the same USB message triggers a double free() when the image upload is marked as finished, also rebooting the device (but that's not exploitable because the double free() happens in a row). posixninja analyzed and explained this one.
This exploit is different from the one being used for the SHAtter jailbreak.
Apple news, rumors, tutorials, price drop alerts, in your inbox every evening, free.
Unsubscribe at any time.
Success!
You have been subscribed.
Add Comment
Would you like to be notified when someone replies or adds a new comment?
Yes (All Threads)
Yes (This Thread Only)
No
Notifications
Would you like to be notified when we post a new Apple news article or tutorial?
Yes
No
Comments (4)
Comments are closed for this article.
0
Tom - September 21, 2010 at 4:46pm
Why is he publishing details of this? Surely Apple will just fix it so it won't be of any use in future iOS releases?
0
noidea - September 21, 2010 at 3:01pm
I just wanted to ask whether there is a difference between the iPod Touch 2G and 3G when it comes to jailbreaking. Also maybe how to tell the difference between the two models. I believe I have a 3G but then again, I'm not certain haha. Please help.
0
Nick Walker - September 21, 2010 at 1:31pm
Pleasedon't use the term "homie"; it makes you sound like an utter twat.
0
ikkviper@gmail.com - September 21, 2010 at 12:50pm
Damn. This dude is on a roll. Keep up the good work homie. :-)