Apple has blocked the TaiG jailbreak with the release of iOS 8.1.3, according to security documents first spotted by iClarified.
A total of four exploits have been closed and credited to the TaiG Jailbreak Team.
-----
AppleFileConduit
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A maliciously crafted afc command may allow access to protected parts of the filesystem
● Description: A vulnerability existed in the symbolic linking mechanism of afc. This issue was addressed by adding additional path checks.
● CVE-2014-4480 : TaiG Jailbreak Team
dyld
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A local user may be able to execute unsigned code
● Description: A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed through improved validation of segment sizes.
● CVE-2014-4455 : TaiG Jailbreak Team
IOHIDFamily
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A malicious application may be able to execute arbitrary code with system privileges
● Description: A buffer overflow existed in IOHIDFamily. This issue was addressed through improved size validation.
● CVE-2014-4487 : TaiG Jailbreak Team
Kernel
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: Maliciously crafted or compromised iOS applications may be able to determine addresses in the kernel
● Description: The mach_port_kobject kernel interface leaked kernel addresses and heap permutation value, which may aid in bypassing address space layout randomization protection. This was addressed by disabling the mach_port_kobject interface in production configurations.
● CVE-2014-4496 : TaiG Jailbreak Team
-----
In addition to closing these vulnerabilities used by TaiG, Apple has closed another kernel vulnerability used by PanguTeam and Stefan Esser.
------
Kernel
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: Maliciously crafted or compromised iOS applications may be able to determine addresses in the kernel
● Description: An information disclosure issue existed in the handling of APIs related to kernel extensions. Responses containing an OSBundleMachOHeaders key may have included kernel addresses, which may aid in bypassing address space layout randomization protection. This issue was addressed by unsliding the addresses before returning them.
● CVE-2014-4491 : @PanguTeam, Stefan Esser
-----
If you still want to jailbreak your device, the iOS 8.1.2 signing window is still open. You have a very limited amount of time to restore to the iOS 8.1.2 and jailbreak. See the iClarified Jailbreak Wizard for details.
Please follow iClarified on Twitter, Facebook, or RSS for more Apple news, tutorials, and videos.
A total of four exploits have been closed and credited to the TaiG Jailbreak Team.
-----
AppleFileConduit
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A maliciously crafted afc command may allow access to protected parts of the filesystem
● Description: A vulnerability existed in the symbolic linking mechanism of afc. This issue was addressed by adding additional path checks.
● CVE-2014-4480 : TaiG Jailbreak Team
dyld
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A local user may be able to execute unsigned code
● Description: A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed through improved validation of segment sizes.
● CVE-2014-4455 : TaiG Jailbreak Team
IOHIDFamily
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A malicious application may be able to execute arbitrary code with system privileges
● Description: A buffer overflow existed in IOHIDFamily. This issue was addressed through improved size validation.
● CVE-2014-4487 : TaiG Jailbreak Team
Kernel
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: Maliciously crafted or compromised iOS applications may be able to determine addresses in the kernel
● Description: The mach_port_kobject kernel interface leaked kernel addresses and heap permutation value, which may aid in bypassing address space layout randomization protection. This was addressed by disabling the mach_port_kobject interface in production configurations.
● CVE-2014-4496 : TaiG Jailbreak Team
-----
In addition to closing these vulnerabilities used by TaiG, Apple has closed another kernel vulnerability used by PanguTeam and Stefan Esser.
------
Kernel
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: Maliciously crafted or compromised iOS applications may be able to determine addresses in the kernel
● Description: An information disclosure issue existed in the handling of APIs related to kernel extensions. Responses containing an OSBundleMachOHeaders key may have included kernel addresses, which may aid in bypassing address space layout randomization protection. This issue was addressed by unsliding the addresses before returning them.
● CVE-2014-4491 : @PanguTeam, Stefan Esser
-----
If you still want to jailbreak your device, the iOS 8.1.2 signing window is still open. You have a very limited amount of time to restore to the iOS 8.1.2 and jailbreak. See the iClarified Jailbreak Wizard for details.
Please follow iClarified on Twitter, Facebook, or RSS for more Apple news, tutorials, and videos.