Apple Credits PanguTeam With Discovering Three Security Vulnerabilities in iOS 8
Posted November 18, 2014 at 4:19am by iClarified
Apple has credited the PanguTeam with discovering three security vulnerabilities in iOS 8.
Earlier today, Apple posted a support document detailing the security content of iOS 8.1.1. In that document, PanguTeam is credited for finding a Dyld, Kernel, and Sandbox Profile vulnerability.
Dyld
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A local user may be able to execute unsigned code
● Description: A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed through improved validation of segment sizes.
● CVE-ID: CVE-2014-4455 : @PanguTeam
Kernel
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A malicious application may be able to execute arbitrary code with system privileges
● Description: A validation issue existed in the handling of certain metadata fields of IOSharedDataQueue objects. This issue was addressed through relocation of the metadata.
● CVE-ID: CVE-2014-4461 : @PanguTeam
Sandbox Profiles
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A malicious application may be able to launch arbitrary binaries on a trusted device
● Description: A permissions issue existed with the debugging functionality for iOS that allowed the spawning of applications on trusted devices that were not being debugged. This was addressed by changes to debugserver's sandbox.
● CVE-ID: CVE-2014-4457 : @PanguTeam
Since Apple has identified the exploits used by PanguTeam, the iOS 8.1.1 firmware update kills the Pangu8 jailbreak.
At this time it's unclear if the PanguTeam have any more exploits up their sleeve but you should follow iClarified on Twitter, Facebook, or RSS for updates.
Read More
Earlier today, Apple posted a support document detailing the security content of iOS 8.1.1. In that document, PanguTeam is credited for finding a Dyld, Kernel, and Sandbox Profile vulnerability.
Dyld
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A local user may be able to execute unsigned code
● Description: A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed through improved validation of segment sizes.
● CVE-ID: CVE-2014-4455 : @PanguTeam
Kernel
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A malicious application may be able to execute arbitrary code with system privileges
● Description: A validation issue existed in the handling of certain metadata fields of IOSharedDataQueue objects. This issue was addressed through relocation of the metadata.
● CVE-ID: CVE-2014-4461 : @PanguTeam
Sandbox Profiles
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A malicious application may be able to launch arbitrary binaries on a trusted device
● Description: A permissions issue existed with the debugging functionality for iOS that allowed the spawning of applications on trusted devices that were not being debugged. This was addressed by changes to debugserver's sandbox.
● CVE-ID: CVE-2014-4457 : @PanguTeam
Since Apple has identified the exploits used by PanguTeam, the iOS 8.1.1 firmware update kills the Pangu8 jailbreak.
At this time it's unclear if the PanguTeam have any more exploits up their sleeve but you should follow iClarified on Twitter, Facebook, or RSS for updates.
Read More