Connect with us

Ciao, cosa stai cercando?

Contenuto bloccato. Devi accettare i cookies per visualizzare questo contenuto.

Jailbreak

Apple blocca il jailbreak del team TaiG con iOS 8.4.1

Con il rilascio di iOS 8.4.1 Apple ha praticamente bloccato il Jailbreak del team TaiG, correggendo alcune vulnerabilità scoperte ed utilizzate proprio dal team di hacker.

taig

Un documento dettagliato sul contenuto di sicurezza di iOS 8.4.1, qui riportato, svela i vari exploit bloccati da Apple. Se quindi non volete rinunciare al Jailbreak, state lontani da iOS 8.4.1.

AppleFileConduit

Advertisement. Scroll to continue reading.

Contenuto bloccato. Devi accettare i cookies per visualizzare questo contenuto.

  • Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
  • Impact: A maliciously crafted afc command may allow access to protected parts of the filesystem
  • Description: An issue existed in the symbolic linking mechanism of afc. This issue was addressed by adding additional path checks.
  • CVE-2015-5746 : evad3rs, TaiG Jailbreak Team

Air Traffic

  • Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
  • Impact: AirTraffic may have allowed access to protected parts of the filesystem
  • Description: A path traversal issue existed in asset handling. This was addressed with improved validation.
  • CVE-2015-5766 : TaiG Jailbreak Team

Backup

  • Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
  • Impact: A malicious application may be able to create symlinks to protected regions of the disk
  • Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization.
  • CVE-2015-5752 : TaiG Jailbreak Team

Code Signing

  • Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
  • Impact: A malicious application may be able to execute unsigned code
  • Description: An issue existed that allowed unsigned code to be appended to signed code in a specially crafted executable file. This issue was addressed through improved code signature validation.
  • CVE-2015-3806 : TaiG Jailbreak Team

Code Signing

  • Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
  • Impact: A specially crafted executable file could allow unsigned, malicious code to execute
  • Description: An issue existed in the way multi-architecture executable files were evaluated that could have allowed unsigned code to be executed. This issue was addressed through improved validation of executable files.
  • CVE-2015-3803 : TaiG Jailbreak Team

Code Signing

  • Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
  • Impact: A local user may be able to execute unsigned code
  • Description: A validation issue existed in the handling of Mach-O files. This was addressed by adding additional checks.
  • CVE-2015-3802 : TaiG Jailbreak Team
  • CVE-2015-3805 : TaiG Jailbreak Team

IOHIDFamily

  • Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
  • Impact: A local user may be able to execute arbitrary code with system privileges
  • Description: A buffer overflow issue existed in IOHIDFamily. This issue was addressed through improved memory handling.
  • CVE-2015-5774 : TaiG Jailbreak Team
Comments

Potrebbero piacerti

Operatori

La fusione tra Wind e Tre ha creato un grosso operatore che oggi lancia sul mercato il proprio virtuale chiamato Very Mobile. Per i...

Concept

Uno studente ha realizzato un concept specifico per la funzione split view e slide over per iPad, gestendo in maniera più professionale la possibilità...

News

Si prevede che Apple introdurrà diversi cambiamenti significativi nella gamma di iPhone entro la fine dell’anno con la serie iPhone 12. Tuttavia, prima di...

Notizie

Facebook ha appena introdotto una nuova funzionalità, sia sul sito in versione desktop che nelle appilcazioni mobile per i terminali iOS, Android e BlackBerry....

Advertisement

Contenuto bloccato. Devi accettare i cookies per visualizzare questo contenuto.

Informativa

Questo sito o gli strumenti terzi da questo utilizzati si avvalgono di cookie necessari al funzionamento ed utili alle finalità illustrate nella cookie policy. Se vuoi saperne di più o negare il consenso a tutti o ad alcuni cookie, consulta la cookie policy.

Chiudendo questo banner, scorrendo questa pagina, cliccando su un link o proseguendo la navigazione in altra maniera, acconsenti all’uso dei cookie.