iOS 6.1.3 Update Kills Evasi0n Jailbreak: What Now?

Apple's iOS 6.1.3 rolled out on Tuesday and it kills the Evasi0n jailbreak, as expected. Sorry, Evad3rs — you'll need to stick to iOS 6.1.2.

The Evasi0n team released its latest jailbreak in February. It utilized five exploits that let users jailbreak their iPhones and iPads. As of Wednesday, Evad3rs had downloaded the jailbreak tool several million times, with 1.7 million downloads occurring the first day it became available.

The now-broken jailbreak tool, Evasi0n 1.4, lasted six weeks.  

One of the hackers who helped code the Evasi0n tool told Forbes that iOS 6.1.3 patched a time zone settings bug, which had previously been one of several vulnerabilities that enabled the untethered jailbreak to work. "Untethered" refers to a jailbreak that remains in effect even if an iOS device is shut off or restarted.

Apple gave the Evasi0n team credit for each of the four exploits they'd discovered — noting the team's name in proper typeset: "evad3rs."

In addition to ruining the Evasi0n jailbreak, iOS 6.1.3 patched a number of other bugs in the operating system. The infamous glitch that allowed you to bypass the lock screen and make calls, listen to voicemail and view photos has been fixed.

If you're running an iOS device that uses an A4 chip or earlier and you've accidentally upgraded to 6.1.3, all is not lost. The folks at Redmond Pie still have a tool that will allow you to roll back your firmware and re-jailbreak.        

For those who are interested, here's the full update log as sent out by Apple's mailing list:

dyld

Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A local user may be able to execute unsigned code Description: A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed by refusing to load an executable with overlapping segments. CVE-ID CVE-2013-0977 : evad3rs

Kernel
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A local user may be able to determine the address of structures in the kernel Description: An information disclosure issue existed in the ARM prefetch abort handler. This issue was addressed by panicking if the prefetch abort handler is not being called from an abort context. CVE-ID CVE-2013-0978 : evad3rs

Lockdown
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A local user may be able to change permissions on arbitrary files Description: When restoring from backup, lockdownd changed permissions on certain files even if the path to the file included a symbolic link. This issue was addressed by not changing permissions on any file with a symlink in its path. CVE-ID CVE-2013-0979 : evad3rs

USB
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: A local user may be able to execute arbitrary code in the kernel Description: The IOUSBDeviceFamily driver used pipe object pointers that came from userspace. This issue was addressed by performing additional validation of pipe object pointers. CVE-ID CVE-2013-0981 : evad3rs

Another flaw concerns a WebKit vulnerability found by the two MWR Labs researchers known as "Nils and Jon" who took out top prize in the recent CanSecWest Pwn2Own for a Chrome bug and one in the Windows kernel.

WebKit
Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: An invalid cast issue existed in the handling of SVG files. This issue was addressed through improved type checking. CVE-ID CVE-2013-0912 : Nils and Jon from MWR Labs working with HP TippingPoint's Zero Day Initiative

© 2024 iTech Post All rights reserved. Do not reproduce without permission.

More from iTechPost