The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Star"
(Added a picture of Star.) |
|||
Line 1: | Line 1: | ||
+ | [[Image:Star.jpg|thumb|Star on an [[N72ap|iPod touch 2G]].]] |
||
Star is a userland [[jailbreak]] from [[User:Comex|comex]] that utilizes 3 unknown exploits (2 new exploits, and 1 from [[Spirit]]) to jailbreak iOS 3.1.2 and later. Star warns that 3.1.2 and 3.1.3 are known to fail though, and that performing a fresh restore to 4.0 is recommended. It can be used via [[Jailbreakme]]. |
Star is a userland [[jailbreak]] from [[User:Comex|comex]] that utilizes 3 unknown exploits (2 new exploits, and 1 from [[Spirit]]) to jailbreak iOS 3.1.2 and later. Star warns that 3.1.2 and 3.1.3 are known to fail though, and that performing a fresh restore to 4.0 is recommended. It can be used via [[Jailbreakme]]. |
||
Revision as of 03:55, 11 August 2010
Star is a userland jailbreak from comex that utilizes 3 unknown exploits (2 new exploits, and 1 from Spirit) to jailbreak iOS 3.1.2 and later. Star warns that 3.1.2 and 3.1.3 are known to fail though, and that performing a fresh restore to 4.0 is recommended. It can be used via Jailbreakme.
Payloads
The first payload is deployed via a http redirect to a prepared pdf file. The PDF contains a CFF font with a malformed type 2 charstring, which contains commands to repeatedly push and duplicate random numbers onto an "argument stack". Presumably this crashes the font parser.
The second payload use an exploit in the kernel to get root access and privileges in order to jailbreak.