Ian Beer Publishes Kernel Exploit for iOS 12 - 12.1.2, Could Lead to Public Jailbreak
Posted February 2, 2019 at 8:14pm by iClarified
Ian Beer, a security researcher for Google's Project Zero, has released an exploit for iOS 12.1.2 that could result in a working jailbreak.
Apple fixed the kernel vulnerability in iOS 12.1.3:
● Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
● Impact: An application may be able to execute arbitrary code with kernel privileges
● Description: A buffer overflow was addressed with improved bounds checking.
● CVE-2019-6213: Ian Beer of Google Project Zero
Beer informed Apple about the vulnerability on December 13, 2018 and Apple released the fix on January 22nd. Code for the "iOS/MacOS kernel heap overflow in PF_KEY due to lack of bounds checking when retrieving statistics" can now be found at the link below.
This is just one of the components needed for a jailbreak but we're hopeful that other developers will use this in their efforts to create public jailbreak of iOS 12.1.2, as they did with Beer's previous exploit of iOS 11. Please follow iClarified on Twitter, Facebook, or RSS for updates.
Read More
Apple fixed the kernel vulnerability in iOS 12.1.3:
● Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
● Impact: An application may be able to execute arbitrary code with kernel privileges
● Description: A buffer overflow was addressed with improved bounds checking.
● CVE-2019-6213: Ian Beer of Google Project Zero
Beer informed Apple about the vulnerability on December 13, 2018 and Apple released the fix on January 22nd. Code for the "iOS/MacOS kernel heap overflow in PF_KEY due to lack of bounds checking when retrieving statistics" can now be found at the link below.
This is just one of the components needed for a jailbreak but we're hopeful that other developers will use this in their efforts to create public jailbreak of iOS 12.1.2, as they did with Beer's previous exploit of iOS 11. Please follow iClarified on Twitter, Facebook, or RSS for updates.
Read More