Apple ha pubblicato un pagina di supporto relativa al contenuto di sicurezza di iOS 8.1.3 attraverso la quale si evince che la società californiana ha bloccato ufficialmente il tool per il Jailbreak di TaiG. Nella pagina, la società ringrazia il team TaiG per aver scoperto le vulnerabilità corrette poi dall’ultima versione di iOS rilasciata nella giornata di ieri.
Ecco tutte le vulnerabilità scoperte dal team TaiG e risolte da Apple con il rilascio di iOS 8.1.3:
-
AppleFileConduit
Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A maliciously crafted afc command may allow access to protected parts of the filesystem
Description: A vulnerability existed in the symbolic linking mechanism of afc. This issue was addressed by adding additional path checks.
CVE-ID
CVE-2014-4480 : TaiG Jailbreak Team
-
dyld
Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A local user may be able to execute unsigned code
Description: A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed through improved validation of segment sizes.
CVE-ID
CVE-2014-4455 : TaiG Jailbreak Team
-
IOHIDFamily
Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A malicious application may be able to execute arbitrary code with system privileges
Description: A buffer overflow existed in IOHIDFamily. This issue was addressed through improved size validation.
CVE-ID
CVE-2014-4487 : TaiG Jailbreak Team
-
Kernel
Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: Maliciously crafted or compromised iOS applications may be able to determine addresses in the kernel
Description: The mach_port_kobject kernel interface leaked kernel addresses and heap permutation value, which may aid in bypassing address space layout randomization protection. This was addressed by disabling the mach_port_kobject interface in production configurations.
CVE-ID
CVE-2014-4496 : TaiG Jailbreak Team
Il jailbreak del team TaiG per iOS 8.1.1 è stato rilasciato il 28 Novembre dello scorso anno, appena una settimana dopo il rilascio del firmware ufficiale. Non sono ancora disponibili informazioni su quando e se il tool verrà aggiornato, quindi, se non potete fare a meno del Jailbreak, vi consigliamo di non aggiornare iOS, almeno fino a quando non verrà rilasciato un tool per il nuovo firmware.
Via | iDownloadBlog
Leggi o Aggiungi Commenti