Tuesday, May 24, 2016

Plugging s For Untethered Jailbrks in iOS 4.3.4

It has now come to light that iOS 4.3.3 won�t be getting an untethered jailbrk from the community anytime soon. The old that was used by i0n1c to jailbrk iOS 4.3.x has apparently been by .

The Dev Tm has been using incomplete -signing attacks to find and perform untethered jailbrks on iOS devices that were running iOS 4.1 and up but this has been with the latest relse iOS 4.3.4. This was done in rction to Comex�s JailbrkMe 3.0 tool that used a PDF in iOS 4.3.3 to jailbrk all iOS devices including the iPad 2.

I0n1c who is actually Stefan Esser an independent iOS has been talking about this on Twitter. He stated that incomplete signing attacks were used for all untether s from at lst iOS 4.1.0. In addition to this iOS 4.3.4 also adds to dyld to detect attacks with binaries using incomplete signing. He went on to say that iOS 4.3.4 does not only fix JailbrkMe 3.0 as announced but also silently kills the ndrv_setspec () integer overflow.

What this all mns to the average person is that iOS 4.3.4 won�t be receiving an untethered jailbrk anytime soon. A significant consequence of course is that all future iOS devices that are sold by Stores will come with iOS 4.3.4 which they won�t be able to jailbrk. What this will mn is that if you buy one of these you will have to live without Cydia until an untethered jailbrk solution is found.

If you have a jail idevice you are advised to stay away from iOS 4.3.4. There is a tethered jailbrk solution available via Redsn0w and Pwnage Tool but with this you have to connect your iOS device to your PC every time you restart it.

No comments:

Post a Comment