CabConModding
Facebook
Twitter
youtube
Discord
Contact us
RSS
Menu
CabConModding
Home
New
Top
Premium
Rules
FAQ - Frequently Asked Questions
Games
Fornite
Call of Duty: Black Ops 3
Clash of Clans
Grand Theft Auto 5
Apex Legends
Assassin’s Creed Origins
Forums
Premium
Latest posts
What's new
Latest posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Log in
Register
What's new
Premium
Latest posts
Menu
Log in
Register
Navigation
Install the app
Install
More options
Dark Theme
Contact us
Close Menu
Forums
Mobile Section
Apple iOS
iOS 11.2 - iOS 11.2.2 Jailbreak Is Close!
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Slander" data-source="post: 33661" data-attributes="member: 6569"><p>A jailbreak for iOS 11.2 through iOS 11.2.2 can come sooner than we think. On January 29th, 2 bluetoothd daemon vulnerabilities were discovered by the Zimperium team. </p><p></p><p>The first vulnerability (<strong>CVE-2018-4095</strong>) is full relative (ASLR bypass) control on the stack in CoreBluetooth that leads to memory corruption over bluetoothd.</p><p> CVE-2018-4095: Rani Idan (@raniXCH) of Zimperium zLabs Team</p><p></p><p>The second major vulnerability (<strong>CVE-2018-4087</strong>) leads to execution of arbitrary code on different crucial daemons in iOS by hijacking the session between each daemon and bluetoothd. Some of the impacted daemons are: SpringBoard, mDNSResponder, aggregated, wifid, Preferences, CommCenter, iaptransportd, findmydeviced, routined, UserEventAgent, carkitd, mediaserverd, bluetoothd, coreduetd and so on.</p><p> CVE-2018-4087: Rani Idan (@raniXCH) of Zimperium zLabs Team</p><p></p><p><img src="https://blog.zimperium.com/wp-content/uploads/2018/01/Rani-daemon.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /> </p><p></p><p>Those were just 2 vulnerabilities through the bluetoothd daemon. However, Adam Donenfeld of the same Zimperium team, has teased us that he is in the possession of another <em>kernel-level</em> bug. Announced in a series of tweets, Donenfeld has confirmed that Apple has finally acknowledged his <em>“kernel heap overflow”</em> bug and fixed it as part of the iOS 11.2.5 release, outlined as reference <em>CVE-2018-4109</em> in Apple’s security release notes. The security researcher has also stipulated that he didn’t specifically write an exploit for this bug to put it into practice but that it is <em>“accessible from the sandbox”</em> and that existing frameworks could put this to good practice for the sake of a < iOS 11.2.5 jailbreak, such as one available from Jonathan Levin.</p><p></p><p>The existence of this bug means that we can potentially see a jailbreak in the future for iOS 11.2 through to iOS 11.2.2. Up until now, the latest jailbreakable version of iOS is iOS 11.1.2, using tools like Electra or LiberiOS.</p><p></p><p><img src="http://cdn.redmondpie.com/wp-content/uploads/2017/06/iOS-11-cydia-tweaks-features.jpg" alt="" class="fr-fic fr-dii fr-draggable " style="" /></p></blockquote><p></p>
[QUOTE="Slander, post: 33661, member: 6569"] A jailbreak for iOS 11.2 through iOS 11.2.2 can come sooner than we think. On January 29th, 2 bluetoothd daemon vulnerabilities were discovered by the Zimperium team. The first vulnerability ([B]CVE-2018-4095[/B]) is full relative (ASLR bypass) control on the stack in CoreBluetooth that leads to memory corruption over bluetoothd. CVE-2018-4095: Rani Idan (@raniXCH) of Zimperium zLabs Team The second major vulnerability ([B]CVE-2018-4087[/B]) leads to execution of arbitrary code on different crucial daemons in iOS by hijacking the session between each daemon and bluetoothd. Some of the impacted daemons are: SpringBoard, mDNSResponder, aggregated, wifid, Preferences, CommCenter, iaptransportd, findmydeviced, routined, UserEventAgent, carkitd, mediaserverd, bluetoothd, coreduetd and so on. CVE-2018-4087: Rani Idan (@raniXCH) of Zimperium zLabs Team [IMG]https://blog.zimperium.com/wp-content/uploads/2018/01/Rani-daemon.png[/IMG] Those were just 2 vulnerabilities through the bluetoothd daemon. However, Adam Donenfeld of the same Zimperium team, has teased us that he is in the possession of another [I]kernel-level[/I] bug. Announced in a series of tweets, Donenfeld has confirmed that Apple has finally acknowledged his [I]“kernel heap overflow”[/I] bug and fixed it as part of the iOS 11.2.5 release, outlined as reference [I]CVE-2018-4109[/I] in Apple’s security release notes. The security researcher has also stipulated that he didn’t specifically write an exploit for this bug to put it into practice but that it is [I]“accessible from the sandbox”[/I] and that existing frameworks could put this to good practice for the sake of a < iOS 11.2.5 jailbreak, such as one available from Jonathan Levin. The existence of this bug means that we can potentially see a jailbreak in the future for iOS 11.2 through to iOS 11.2.2. Up until now, the latest jailbreakable version of iOS is iOS 11.1.2, using tools like Electra or LiberiOS. [IMG]http://cdn.redmondpie.com/wp-content/uploads/2017/06/iOS-11-cydia-tweaks-features.jpg[/IMG] [/QUOTE]
Verification
Post reply
Forums
Mobile Section
Apple iOS
iOS 11.2 - iOS 11.2.2 Jailbreak Is Close!
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top