脱獄犯は要注意!「iOS 8.4.1」での脱獄は不可。TaiGで用いられていた8つの脆弱性を修正

 
S__15392907

本日(8/14)、正式にリリースされた「iOS 8.4.1」だがiOS 8.1.3〜iOS 8.4までの脱獄に対応している「TaiG 2」で用いられている8つの脆弱性が塞がれており脱獄できないことが明らかとなった。

セキュリティノートにTaiGで用いられた脆弱性8つが明記

最新のiOSをリリースされるたびに公開されるセキュリティノートには、TaiG Jailbreak Team並びにevad3rs等の名前が挙げられており、TaiGチームが発見した脆弱性として8つが明記されている。

全てがTaiG 2で使用されていたものであるかは不明であるが今回の修正により、iOS 8.4.1での脱獄は現状不可能に。

今回修正された脆弱性

AppleFileConduit

Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A maliciously crafted afc command may allow access to protected parts of the filesystem
Description: An issue existed in the symbolic linking mechanism of afc. This issue was addressed by adding additional path checks.

Air Traffic

Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: AirTraffic may have allowed access to protected parts of the filesystem
Description: A path traversal issue existed in asset handling. This was addressed with improved validation.

Backup

Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A malicious application may be able to create symlinks to protected regions of the disk
Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization.

Code Signing

Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A malicious application may be able to execute unsigned code
Description: An issue existed that allowed unsigned code to be appended to signed code in a specially crafted executable file. This issue was addressed through improved code signature validation.

Code Signing

Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A specially crafted executable file could allow unsigned, malicious code to execute
Description: An issue existed in the way multi-architecture executable files were evaluated that could have allowed unsigned code to be executed. This issue was addressed through improved validation of executable files.

Code Signing

Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A local user may be able to execute unsigned code
Description: A validation issue existed in the handling of Mach-O files. This was addressed by adding additional checks.

IOHIDFamily

Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A local user may be able to execute arbitrary code with system privileges
Description: A buffer overflow issue existed in IOHIDFamily. This issue was addressed through improved memory handling.

この記事が気に入ったら
いいね!しよう

 

関連記事

Comment

*

CAPTCHA