The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "CVE-2013-0964"
(Still needs work) |
|||
(5 intermediate revisions by 3 users not shown) | |||
Line 12: | Line 12: | ||
== Jailbreak == |
== Jailbreak == |
||
− | [[User:Planetbeing|planetbeing]] states that he worked out a nice [[jailbreak]] for it, that will never see the light of day |
+ | [[User:Planetbeing|planetbeing]] states that he worked out a nice [[jailbreak]] for it, that will never see the light of day. [[i0n1c]] responded that it is difficult to exploit it in a stable way and he would like to see a description for it. |
+ | |||
+ | == First page of memory == |
||
+ | The first page of kernel memory (and eDRAM) contains the sleep token. The sleep token is used from LLB to resume the system and restore its context accordingly. To jump back to the kernel, the LLB checks for the 'MOSX,SUSP' signature in the image and then calls 'jump_to' to exit the bootloader and return control to the OS. |
||
== Process == |
== Process == |
||
− | [[Category:Pages with TODO sections]] |
||
TODO: Describe copyin/copyout functions and the fix in detail. |
TODO: Describe copyin/copyout functions and the fix in detail. |
||
Line 28: | Line 30: | ||
* [https://twitter.com/i0n1c/status/296163383357620225 i0n1c saying it's difficult to exploit it stable] |
* [https://twitter.com/i0n1c/status/296163383357620225 i0n1c saying it's difficult to exploit it stable] |
||
− | {{stub| |
+ | {{stub|exploit}} |
[[Category:Exploits]] |
[[Category:Exploits]] |
Latest revision as of 15:43, 18 August 2013
CVE-2013-0964 is an vulnerability in the kernel of iOS. It was initially discovered by Mark Dowd and Tarjei Mandt who presented it at HiTB 2012 in Kuala Lumpur. This vulnerability allows userland processes access to the first page of the kernel, because the copyin
and copyout
arguments were not checked for their range when the length is small enough. Apple patched the vulnerability in iOS 6.1.
Contents
Credit
Apple's description
Impact: A user-mode process may be able to access the first page of kernel memory
Description: The iOS kernel has checks to validate that the user-mode pointer and length passed to the copyin and copyout functions would not result in a user-mode process being able to directly access kernel memory. The checks were not being used if the length was smaller than one page. This issue was addressed through additional validation of the arguments to copyin and copyout.
Jailbreak
planetbeing states that he worked out a nice jailbreak for it, that will never see the light of day. i0n1c responded that it is difficult to exploit it in a stable way and he would like to see a description for it.
First page of memory
The first page of kernel memory (and eDRAM) contains the sleep token. The sleep token is used from LLB to resume the system and restore its context accordingly. To jump back to the kernel, the LLB checks for the 'MOSX,SUSP' signature in the image and then calls 'jump_to' to exit the bootloader and return control to the OS.
Process
TODO: Describe copyin/copyout functions and the fix in detail.
TODO: Describe how this can get exploited in a stable way.
References
External Links
- Mark Dowd & Tarjei Mandt's iOS6 presentation at HITB 2012 KUL D1T2
- Planetbeing saying he had a jailbreak for it
- i0n1c saying it's difficult to exploit it stable
This exploit article is a "stub", an incomplete page. Please add more content to this article and remove this tag. |