A total of four exploits have been closed and credited to the TaiG Jailbreak Team.
----- AppleFileConduit ● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later ● Impact: A maliciously crafted afc command may allow access to protected parts of the filesystem ● Description: A vulnerability existed in the symbolic linking mechanism of afc. This issue was addressed by adding additional path checks. ● CVE-2014-4480 : TaiG Jailbreak Team
dyld ● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later ● Impact: A local user may be able to execute unsigned code ● Description: A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed through improved validation of segment sizes. ● CVE-2014-4455 : TaiG Jailbreak Team
IOHIDFamily ● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later ● Impact: A malicious application may be able to execute arbitrary code with system privileges ● Description: A buffer overflow existed in IOHIDFamily. This issue was addressed through improved size validation. ● CVE-2014-4487 : TaiG Jailbreak Team
Kernel ● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later ● Impact: Maliciously crafted or compromised iOS applications may be able to determine addresses in the kernel ● Description: The mach_port_kobject kernel interface leaked kernel addresses and heap permutation value, which may aid in bypassing address space layout randomization protection. This was addressed by disabling the mach_port_kobject interface in production configurations. ● CVE-2014-4496 : TaiG Jailbreak Team -----
In addition to closing these vulnerabilities used by TaiG, Apple has closed another kernel vulnerability used by PanguTeam and Stefan Esser.
------ Kernel ● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later ● Impact: Maliciously crafted or compromised iOS applications may be able to determine addresses in the kernel ● Description: An information disclosure issue existed in the handling of APIs related to kernel extensions. Responses containing an OSBundleMachOHeaders key may have included kernel addresses, which may aid in bypassing address space layout randomization protection. This issue was addressed by unsliding the addresses before returning them. ● CVE-2014-4491 : @PanguTeam, Stefan Esser -----
If you still want to jailbreak your device, the iOS 8.1.2 signing window is still open. You have a very limited amount of time to restore to the iOS 8.1.2 and jailbreak. See the iClarified Jailbreak Wizard for details.
Please follow iClarified on Twitter, Facebook, or RSS for more Apple news, tutorials, and videos.
Add Comment
Would you like to be notified when someone replies or adds a new comment?
Yes (All Threads)
Yes (This Thread Only)
No
Notifications
Would you like to be notified when we post a new Apple news article or tutorial?
Jailbreaking is fine. However, when the security exploits that are needed are announced to everyone in the world (which has to happen when a jailbreaking tool is released), then Apple has no choice but to patch the holes. Just the way it is.
I have been using jailbreak since I first had my iPod touch first generation YEARS ago. Still love jailbreaking. But my question is, why do people always think that apple people are followers? Does it not occur to anybody that you can choose this type of phone for the operating system! Why always compare the things the phones can do? Think of the way how you can work with a phone. I also have an android device in my home, but it is so much more difficult to work with!! the IOS is for me the reason to stay with the apple phone. in my opinion it is much user friendlier. So please stop comparing the devices! Compare the operating systems! That is for many people the reason to buy a phone. Most phones can do the same things ( things you would need) but how to use it is a very different thing. So let's all agree that some people like to WORK with IOS and some people LIKE to Work with ANDROID.
Do you REALLY think that Windows phone will EVER be a contender? Take a look at the numbers Truth Teller. They sell well in impoverished Eastern Block European countries, but everywhere else, they hardly sell anything, and now hardly any cellphone make supports them (aside from the ones that M$ bought to prop up the failing OS).
Preach on brother. Just like if you want to know the future of cars look no further than the mercedes s class. If you want to see the future of ios look no further than jailbreak features. At some point jaibreaking will be useless. For example if apple let consumers have a 1 day return policy for apps it could possibly end the piracy in jailbreaking. I have no problem in paying for a quality app. But I think that 1. Apple will lose money if people can return an app 2. It will clean up the App Store of the junk but also lower the amount of apps so then they lose that marketing subject. App Store is a cluster fu ck.
While Apple sells plenty of devices when JBs aren't available (after all, plenty of people are fine with the basic Apple device), have you noticed how exponential the sales are when JBs ARE available?
Look at the rest sales of the Apple 6s, and the boost in 5s after iOS 7 was JB.
However, aren't we all proud of the Taig amateur jailbreakers, who squandered every single iOS vulnerability--releasing new jailbreaks before they even knew whether the older ones worked or not. My hats off to them for their blind greed and attention mongering at the expense of usefulness and creativity.
wow...did you guys noticed it? the Taig jb was available just to leave guys with mac to jb before they block the exploit...whatever the case jb will ever be possible,ios can't survive without jb
You do know that they needed all 4 exploits to make the jailbreak work right? you can't jailbreak with just one exploit, they all depend on each other to get cydia to work properly. back when greenpo1son came out for ios 4.2.1, it used 4 exploits to work, and that's how it's almost always going to be 3-6 exploits to get kernel privileges then root privileges, then be able to run unsigned code, and make it so that when you reboot the unsigning stays the same to be able to be nontethered