Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Mobile
    • PC Hardware

    Latest Apple iOS Jailbreak Tool Exploits Two Security Flaws

    By
    Fahmida Y. Rashid
    -
    January 3, 2012
    Share
    Facebook
    Twitter
    Linkedin

      A researcher has released a new jailbreak tool that would allow iPhone users to run code from sources other than Apple’s iTunes App Store.

      The new jailbreak, dubbed Corona, takes advantage of two different bugs in iOS 5 to untether iPhones and other devices running iOS 5.01, a researcher, pod2g, wrote on his iOS Research blog Jan. 2. One flaw exists in the iOS binary and the other was a heap overflow in the kernel, according to the post.

      Apple has in the past moved quickly to patch security flaws as soon as a jailbreak is publicized. With the code for Corona public, the company is expected to close these holes in the next security update.

      “Apple has fixed all previous known ways of executing unsigned binaries in iOS 5.0,” pod2g wrote, noting that Corona accomplishes its task “another way.”

      The jailbreak tool relies on vulnerabilities in existing Apple binaries that are loaded using standard functions, pod2g said. Researchers used to create data pages that could be loaded on to the device to launch the jailbreak code prior to iOS 5, according to pod2g. Apple modified data pages to require that they also be digitally signed by Apple to verify its authenticity in iOS 5, so pod2g piggybacked the exploit code onto existing binaries.

      The “raccoon” binary is used for setting up IPSec connections from the iOS devices and is started automatically whenever the user sets up a network connection, according to pod2g. The tool uses the vulnerability to copy a bootstrap payload to the device’s memory and runs the actual exploit code. The code also uses a previously discovered heap overflow flaw in the iOS kernel but pod2g said he wasn’t clear what was actually happening in the kernel.

      “I never figured it out exactly,” pod2g wrote, adding that he found the issue using a “fuzzing” tool.

      The fact that Coronoa took advantage of a format string bug raised a few eyebrows amongst security experts. Chris Wysopal, CTO of Veracode, wondered on Twitter if Apple was not using static analysis tools to hunt for security holes in its code. “These bugs [format string bug] are easy to find with it,” Wysopal wrote on Twitter.

      The Corona jailbreak has been added to the redsn0w packages that can be used to untether devices. It can be downloaded from Websites belonging to two Apple hacking groups, greenpois0n and the iPhone Dev Team. It appears that pod2g is also working on a jailbreak update that would work on iOS devices that use the A5 chip, such as the iPhone 4S.

      “With some luck we could expect a release in a week,” pod2g wrote on Twitter.

      Even though Apple claims jalbreaking-or cracking the iOS to be able to run unofficial applications-was illegal, the U.S. Copyright Office said in 2009 it was legal for iPhones and other smartphones. As a result, Apple and jailbreak hackers are in the game of cat-and-mouse as the company tries to quickly patch every vulnerability they discover. The Electronic Frontier Foundation has asked the Copyright Office to extend the exemption to the Digital Millennium Copyright Act to protect users who want to jailbreak tablets, e-readers and video game consoles.

      Avatar
      Fahmida Y. Rashid

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×