Difference between revisions of "AT+XLOG Vulnerability"

From The iPhone Wiki
Jump to: navigation, search
(New page: Used as an injection vector for the current iPhone 3G unlock payload - ultrasn0w. Currently available in all baseband versions, but it's very likely that Apple will ...)
 
m
Line 1: Line 1:
Used as an injection vector for the current [[iPhone 3G]] [[Unlock 2.0|unlock]] payload - [[ultrasn0w]]. Currently available in all baseband versions, but it's very likely that Apple will close this exploit in the next baseband version.
+
Used as an injection vector for the current [[iPhone 3G]] [[Unlock 2.0|unlock]] payload - [[ultrasn0w]]. Currently available in all baseband versions, but it's very likely that Apple will close this exploit in the next baseband update.
   
 
==Credit==
 
==Credit==

Revision as of 11:37, 23 June 2009

Used as an injection vector for the current iPhone 3G unlock payload - ultrasn0w. Currently available in all baseband versions, but it's very likely that Apple will close this exploit in the next baseband update.

Credit

Oranav

Exploit

There is a buffer overflow in the AT+XLOG=1,"..." command, which allows unsigned code execution on the iPhone 3G baseband.

Implementation

The exploit is used in ultrasn0w.