The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "P0sixspwn"
Ra1ningSn0w (talk | contribs) |
m (Looks like "proove" should be "prove".) |
||
Line 65: | Line 65: | ||
== Exploits == |
== Exploits == |
||
− | * [[posix_spawn kernel information leak]] (by [[i0n1c]]) ( |
+ | * [[posix_spawn kernel information leak]] (by [[i0n1c]]) (prove? what is it used for?) |
− | * [[mach_msg_ool_descriptor_ts for heap shaping]] ( |
+ | * [[mach_msg_ool_descriptor_ts for heap shaping]] (prove/quotes? no information found) |
* [[AMFID_code_signing_evasion]] |
* [[AMFID_code_signing_evasion]] |
||
− | * [[DeveloperDiskImage race condition]] (by [[comex]]) ( |
+ | * [[DeveloperDiskImage race condition]] (by [[comex]]) (prove/quotes? no information found) |
* [[Symbolic Link Vulnerability]] |
* [[Symbolic Link Vulnerability]] |
||
* [[launchd.conf untether]] |
* [[launchd.conf untether]] |
Revision as of 22:19, 5 January 2014
p0sixspwn is an untethered jailbreak for iOS 6.1.3-6.1.5 by winocm, iH8sn0w and SquiffyPwn. It was initially made available as an Cydia package on Saurik's repo to untether already jailbroken devices. It works with all devices that support iOS 6.1.3-6.1.5 and 5.2.1 - 5.3 on Apple TV 2G. On 30 December 2013, a Mac OS X program was released to perform a jailbreak. A Windows program was released on 3 January 2014.
Cydia Package Changelog
- 1.0-5 the initial release of the untether
- 1.0-9 iPhone 4 GSM boot loop fix
- 1.1-1 Automatically reboot after 30 seconds if device did not boot. (iH8sn0w's repo only)
- 1.1-2 Automatically reboot after one minute if device did not boot due to 30 seconds was too quick. (iH8sn0w's repo only)
- 1.1-3 Automatically reboot after two minutes if device did not boot due to 60 seconds was too quick. (iH8sn0w's repo only)
- 1.2-1 Various bug fixes.
- 1.3-2 Fixes iMessage, LTE issues and Apple TV 2G support.
Desktop Download
Version | OS | SHA-1 Hash | Download | Changes |
---|---|---|---|---|
1.0.0 | OS X | b5a66f4e58ab4c813fc851d479b28188eb5115ec
|
Mega |
|
1.0.1 | ae5b3907660b161b2ff94a2e2cfef97195404a89
|
Mega |
| |
1.0.2 | 259e95fd16468260c8831ca17186f50b7d14ba41
|
Mega |
| |
1.0.3 | Windows | 060c95cda0e5ad861bd225ca19324e6ebd3c0a5d
|
Mega |
|
1.0.4 | 0a40a9780ba0dd9f0476d12950b4fb0026c8559a
|
Mega |
| |
1.0.5 | OS X | b99fb1de846c406a15bbd710b623ddd78e139e5e
|
Mega |
|
Windows | 7c782a39ed123f70594e2438eaacc95340e363e3
|
Mega |
Exploits
- posix_spawn kernel information leak (by i0n1c) (prove? what is it used for?)
- mach_msg_ool_descriptor_ts for heap shaping (prove/quotes? no information found)
- AMFID_code_signing_evasion
- DeveloperDiskImage race condition (by comex) (prove/quotes? no information found)
- Symbolic Link Vulnerability
- launchd.conf untether