iOS 6.1.3 Kills Evasi0n by Fixing 4 out of 6 Exploits

iOS 6.1.3 Kills Evasi0n by Fixing 4 out of 6 Exploits, iOS 6.1.3 is out. Excited? Well don’t be! It’s not so good news for jailbreakersApple has fixed 6 security flaws in the new update, 4 of which are used by the Evad3rs team in Evasi0n. The only good news: the lock screen vulnerability has been fixed. Apple has credited Evad3rs for finding out the 4 security flaws that it fixed in the current update. Evasi0n is a combination of 5 security flaws, which when used together, can be used to jailbreak an iOS device.

ios-6.1.3-evasi0n-jailbreak-evasion

But David Wang (planetbeing) says that even if these 4 flaws are fixed, the Evad3rs team has discovered other flaws, which can be used to jailbreak an iOS device. The following are the 4 security flaws among others that have been fixed by Apple in iOS 6.1.3

Dyld

Available for: iPhone 3GS and later,?iPod touch (4th generation) and later, iPad 2 and later?Impact: A local user may be able to execute unsigned code?Description: A state management issue existed in the handling of?Mach-O executable files with overlapping segments. This issue was?addressed by refusing to load an executable with overlapping?segments.?CVE-ID?CVE-2013-0977 : evad3rs

Kernel

Available for: iPhone 3GS and later,?iPod touch (4th generation) and later, iPad 2 and later?Impact: A local user may be able to determine the address of?structures in the kernel?Description: An information disclosure issue existed in the ARM?prefetch abort handler. This issue was addressed by panicking if the?prefetch abort handler is not being called from an abort context.?CVE-ID?CVE-2013-0978 : evad3rs

Lockdown

Available for: iPhone 3GS and later,?iPod touch (4th generation) and later, iPad 2 and later?Impact: A local user may be able to change permissions on arbitrary?files?Description: When restoring from backup, lockdown changed?permissions on certain files even if the path to the file included a?symbolic link. This issue was addressed by not changing permissions?on any file with a symlink in its path.?CVE-ID?CVE-2013-0979 : evad3rs

USB

Available for: iPhone 3GS and later,?iPod touch (4th generation) and later, iPad 2 and later?Impact: A local user may be able to execute arbitrary code in the?kernel?Description: The IOUSBDeviceFamily driver used pipe object pointers?that came from userspace. This issue was addressed by performing?additional validation of pipe object pointers.?CVE-ID?CVE-2013-0981 : evad3rs

With these fixed exploits is this the end of the ever popular Evasi0n jailbreak tool, we hope not. Evad3rs have already made it clear that they have a lot more exploits available that can possibly do an untethered jailbreak, the exploits are still being tested for a suitable outcome. Follow us on Facebook or twitter and Subscribe to our feeds to stay updated with the latest updates. The jailbreak scene is hot now, we will push updates as they come out.

Top Trending Articles :

Share on Facebook

Comments are closed.