Apple IOS 4.3.4 Jailbroken Hours After Update 121
Stoobalou writes "The cat and mouse game between Apple and the jailbreaking community continues unabated as an updated version of PwnageTool hits the web just hours after apple updated its iOS mobile operating system to lock out the JailbreakMe PDF-based exploit."
Re: (Score:2)
"The same users"? I'm sure you can provide an example of the same person saying those two things, yes?
Re: (Score:2, Insightful)
I don't hold out much hope. His comment doesn't even make sense to anyone who has actually read the article. 100% troll.
Re: (Score:2)
yeah the new exploit is tethered only this time. so it only took apple couple of weeks(?) to fix the browser accessible hole.
Re: (Score:3)
This is the internet... we normally don't require MLA citations for things that are more or less common sense.
Re: (Score:2, Insightful)
Translation: "I never question things I want to be true, I just call them common sense instead."
Re: (Score:2)
That is the rule of the internet. Just remember about 1/2 of the population has below average intelligence.
Re: (Score:1)
100% of the internet population is over-opinionated and under-informed
Re: (Score:1)
Re: (Score:2)
I believe your premise is over-thought and overrated, and humbly suggest you collect more data before making said assumption.
Re: (Score:2)
Common sense is not common and what is touted as "common sense" rarely makes sense when scrutinized.
For example, any political campaign that runs with a core "common sense" message.
Re: (Score:1)
[citation needed] (Score:2)
This is the internet... we normally don't require MLA citations for things that are more or less common sense.
But if something is contested, it'd be nice to have a URL or at least proper Google keywords to research the issue. Hence the "citation needed" meme that started at Wikipedia.
Re: (Score:3)
Re: (Score:3)
WRONG answer, all those users that do no jailbreak their iPhones (a lot of people) are vulnerable to this attack, those are not jailbreak possibilities, those are big security vulnerabilities that are used to jailbreak. I am pretty sure any other OS manufacturer bug like this will be called like they must be called "Security bugs" and not jailbreaks
Re: (Score:2)
However jailbreak users had a fix for this vulnerability available immediately right from the device itself, while non jailbreak users had to wait for Apple to provide one, and then must tether their device to a computer, download a large firmware file, reflash it and then restore all their settings to the device in order to be immune to the exploit.
Re: (Score:2)
However jailbreak users had a fix for this vulnerability available immediately right from the device itself, while non jailbreak users had to wait for Apple to provide one, and then must tether their device to a computer, download a large firmware file, reflash it and then restore all their settings to the device in order to be immune to the exploit.
I don't let third parties patch my systems, at work or at home. But... Both tethering and the large firmware file are accurate but no longer true in iOS5 due possibly in September. The reflash and "restore" is currently handled by iTunes in one operation. I use the bunny ears for restore because I don't know the specifics, but the end user experience is to click "OK" when prompted to update and a bit later the phone is updated and ready for use. There is no separate restore.
Re: (Score:2)
Re: (Score:2)
Um, what?
Steps you listed, for jailbreakers:
1. There is no step one.
Non-jailbreakers:
1. Wait for Apple
2. tether to computer
3. download a "large" file
4. reflash it
5. restore settings
You artificially expanded one set of steps, and collapsed the other. Why is that?
Re:It's a drive-by download exploit (Score:5, Informative)
Here's a fixed title for you: Slashdot user fails at basic reading comprehension. It is NOT a drive-by-download exploit. The drive-by-download PDF vulnerability existed in 4.3.3 but was rapidly patched with the release of 4.3.4, and it has yet to be reopened as a viable exploit. Instead, what these hackers/developers/<your spin here> have managed to do is update their tethered means of jailbreaking to work with 4.3.4, but it currently requires being tethered to your computer with each and every reboot, otherwise you lose root. It's about as far from a drive-by-download as you can imagine and is not currently susceptible to malicious attacks unless you compromise physical access to your device. Now, pardon me while I tout how secure my Apple product is.
Re: (Score:2)
Re: (Score:2)
You're going to call and send SMS with an iPad? Good luck with that.
"Use premium data" maybe? Again I lawl, sir.
Re: (Score:2)
Considering mine iPad has cellular and a phone number, its not like its impossible.
Of course, I do actually send and make calls if for some reason my phone doesn't work, on my ipad ... but thats VoIP which is only brought into play if the closest landline is at least 48 hours away from me at best possible speed, but thats with another couple of non-builtin apps I've added.
Re: (Score:2)
That's nice. My iPad 3G has been doing those things for over a year as well. Those are through apps, not natively. Unless the exploiters are writing and installing a custom baseband, they are NOT making premium SMS or premium calls from either of our iPads. I doubt AT&T would know what to do if you spoofed a data iPad's SIM and tried to make a call, they'd probably just drop the connection.
Re: (Score:2)
Yes, I don't go to porn sites to look at the pictures. I read the (PDF) articles.
Re: (Score:2)
Realistically and unsurprisingly (Score:2)
Did you expect otherwise?
In the words of Stanley Jobson, from the film Swordfish, "Nothing is impossible."
Note: "There was an unknown error in the submission", constantly. I suspect you think this is spam, or the hamster in your wheel has died. so please let this post go through, comment system.
Re: (Score:3, Informative)
Did you expect otherwise?
Yesterday Slashdot's summary said the last update was to prevent jailbreaking. The article said it was to fix the PDF vulnerability. So, yes, you might expect otherwise if you weren't terribly well informed on the topic.
Re:Realistically and unsurprisingly (Score:4, Interesting)
Note: "There was an unknown error in the submission", constantly. I suspect you think this is spam
nah, /. implemented Hotmails ban of common passwords [slashdot.org] and "swordfish" is on the list...
as a more serious remark: no, I didn't expect a different outcome of the update. It seems that Apple is way too exposed, the [add color]-hat scene has a new interesting opponent - it is boring to hit guys already lying on the ground. But Apple fights like hell to keep their secrets secret, obviously irresistible for hackers.
This reminds me of the PS3 debacle: The system was attacked after Sony removed the playground "other OS", I believe that a more open approach for iDevices (like store-independent software installation) would decrease the breaking attempts.
Re: (Score:2)
Apple doesn't fight to keep their secrets secret, it fights to sell you their iCake yet keep it too.
Frankly, it's about time this idiocy stops. In no other business can you sell someone a device, then charge for its use. And program industry with their "licensing" nonsense is even worse. Can't these creeps be dragged to the court and dealt with, so the industries can heal and start working according to the normal co
Re: (Score:2)
Frankly, it's about time this idiocy stops. In no other business can you sell someone a device, then charge for its use.
I'm not sure what you mean. Assuming this isn't a general comment on charges for mobile phones... What charges for use?
Re: (Score:2)
Frankly, it's about time this idiocy stops. In no other business can you sell someone a device, then charge for its use.
So at no point in your life have you ever seen a 'telephone' then have you? You buy the phone then pay to use it, its been that way since the government stepped in and stopped it from being you paid out the ass to lease a phone and out the ass to use it.
Re: (Score:2)
Ah, but wait. You only need to pay to use the telephone on someone's network - I.e. paying for service. You're free to take that telephone and hook it up to your own internal network and not pay a dime. You can take that telephone apart and use it for anything you want without paying any service - the only time you need to pay for service is when you want to use someone else's network.
Re: (Score:2)
Re: (Score:2)
Do you have to buy that gas from the manufacturer or through him? Is there something stopping you from using whatever additives you desire?
But yes, cars are going in worse direction: many newer ones are made intentionally difficult to service without the manufacturer's specialized tools. This is a trend that's noticeable else where too: for example, consider printers with a challenge-response authentication for the printhead/ink
Re: (Score:2)
Re: (Score:2)
Just a side comment, but when they sell you a car, don't they tax you for the roads through gasoline? Isn't that 'charging for it's use'?
You can use a cellphone off network for zero charge. You'd have the equivalent of an iPod touch. Cellphones are devices that need a network to run, much like cars need roads to run, and thus you pay seperate charges for the roads and for the device itself.
There are countless other examples. You buy a TV, then pay to use cable. You buy a heater, then pay for fuel.
While you
Re: (Score:2)
This reminds me of the PS3 debacle: The system was attacked after Sony removed the playground "other OS", I believe that a more open approach for iDevices (like store-independent software installation) would decrease the breaking attempts.
This is an interesting comment (for once); So I will give it a considered reply (that someone will instantly discount solely on the basis of my username). But anyway...
/. Users (Not to mention the legions of ACs...) must agree wi
While what you propose is a superficially sound idea, it does not bear up under scrutiny. Why? Because as soon as you "Tear Down These Walls", and allow "sideloading" (what an ignorant term!) of non-approved apps, there is instantly a problem, and it's one that all the Anti-Apple
Re: (Score:2)
So build a little tiny switch into the inside of the device, with a little hole for a pin to access it. By pressing that switch, you enable developer mode which is open. Press it again and it goes back to locked mode.
That way normal users can be secure in their walled garden, and power users can get what they want easily.
It's the approach the Chromebooks are using, and I'm impressed. I, for one, won't buy a device I can't completely root(and has an unlocked bootloader, for running custom OS's), but others m
Re: (Score:2)
Well, I expected a patch, but it wasn't to "stop jailbreaking" as much as slashdot would like to think so. It's not some machiavellian plot to thwart homebrew, but a patch to close a gaping security hole (you know, what Apple gets flamed for "not doing quickly enough").
Colour me unsurprised they patched a hole that allowed root escalation via the PDF handler. I would call that "due diligence", and would be lauded by slashdot if it were fixed by anyone except Apple.
This is TETHERED (Score:1)
Tethered is much easier to do, and much less useful, since it requires re-doing it after every device reboot.
Dear hackers (Score:4, Interesting)
Thanks to your desire to run any software you wish, you're finding security holes for Apple, free of charge.
Keep up the good work.
Re: (Score:3)
The same guys Steve Jobs identified as terrorists [intomobile.com]?
Took /. longer to follow up (Score:2)
Slashdot used to be run by technical editors (Score:5, Informative)
No, this isn't a new jailbreak. It's an existing exploit which uses the same hardware exploit found by Geohot MONTHS ago. The exploit install software is now configured for the new iOS version is all. This is why it's a TETHERED exploit, as the untethered exploit add-on no longer works in 4.3.4.
Is anyone technical even working at Slashdot anymore?
Re: (Score:3)
No shit. The fact you used to be able to jailbreak your phone by visiting a website was not, in fact, a good thing. At all.
I'm against all sorts of restrictions on devices sold to people. I'd even argue we should make it illegal to restrict them that way, although for safety we should perhaps require some sort of protected reflash to jailbreak them, so normal consumers don't have to worry about viruses.
But, legally, people should be able to walk into an Apple store and demand root on their phone, and Appl
Re: (Score:2)
Seconded...
When people can get "root" on your pc from you visiting a website....that's bad...
Why should your phone be any different?
Re: (Score:1)
That is my ideal world. Companies should not be allowed to keep control of devices they sell you. (Note this isn't the same as unlocking the phones, which I don't think they should have to do.)
I'm curious. While you argue in favor of jailbreak as a right of the customers, you are not okay with unlock.
Why is it okay for a company to disallow use of a product with any network. Once the customer has paid for the phone, its his/her choice which network to use.
Re: (Score:2)
I'm not in favor of unlock because while normal people pay the termination fee (And thus should have their phone unlock.), you apparently don't know about the actual reason for locking phones.
Specifically, people walking into AT&T stores with stolen credit cards, use that name, get an iPhone and a 'contract', and walking out and resell it.
I'm all for requiring the phone company to unlock any phone that you've actually paid off, either with time or a termination fee. The thing is, they already do that.
Re: (Score:2)
Specifically, people walking into AT&T stores with stolen credit cards, use that name, get an iPhone and a 'contract', and walking out and resell it
What bunch of complete and utter morons enter into an ongoing contract with someone that just has a credit card and no identification to back it up?! Their stupidity isn't a reason to impose that restriction on customers.
Re: (Score:2)
Why shouldn't they also have to unlock the phone? You're paying for it and the termination fees on a service contract assure you will pay for it even if you switch providers.
Re: (Score:2)
Because people steal iPhones. They pay for their contract with a bogus credit card, walk out of the store, and resell them.
Re: (Score:2)
That's between the crooks and their carriers. People steal all sorts of things from chewing gum on up to heavy equipment. That's not a valid reason to impair everyone's ownership of what they pay for.
If the carriers would like to find a cooperative solution, perhaps they should agree to provide the unlocking codes themselves after enough payments have been made to satisfy them that the customer is legitimate and in return, we can cut them a little slack for the first few months.
Re: (Score:2)
Carrier locks have nothing to do with fraud or theft, unless it is fraud on the part of the carrier by making people use the phones they sold them on their generic network signal.
* In the UK this happens. Does the other side of the pond use the IMEI database to make iPhones into iPod Touches too?
Re: (Score:2)
From what I understand, the IMEI blacklist is almost useless, because almost every phone has the ability to change IMEI numbers.
Re: (Score:2)
Re: (Score:2)
Erm, yes, up to five years in jail stops 'legitimate owners' from doing it.
It really doesn't stop people who stolen a phone.
Re: (Score:3)
The fact you used to be able to jailbreak your phone by visiting a website was not, in fact, a good thing.
Mostly true, however I might add that these exploits will almost inevitably exist as long as software originates with humans. I'm glad we're seeing them used for "good" with jailbreaks rather than for evil. Comex could easily have offered his services to the highest eastern European bidder instead of releasing a jailbreak (with the caveat that the jailbreak may well install a trojan horse for all I kn
Re: (Score:2)
Perhaps when Apple forces you to buy an iDevice, you may have a point. Until then, you opt into buying it, and you can certainly jailbrake it, but don't expect them to support your efforts or your hardware after the fact. Companies have been voiding warranties long before apple when it came to running a product out of specification. This is no different.
I believe you mean 'companies have been attempting to void warranties based on random things long before apple did, and the courts and legislatures have
Re: (Score:2)
Is anyone technical even working at Slashdot anymore?
Yes, but but we still don't RTFA.
Tethered jailbreak (Score:5, Informative)
The PDF font handling vulnerability gave you perma-root (unthethered) and could also be used as a drive-by exploit.
In short, misleading title is misleading.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
No, you're correct. Jailbreaking gives you root. It refers to breaking out of the jail() that iOS puts on apps, and as a side effect, also gives you root.
However, iOS has a few more security protections that make it harder to KEEP root. After all, Cydia and the like must r
Re: (Score:1)
Do you happen to know how the drive-by PDF exploit manages to keep root, then? I'm curious as I don't see how arbitrary code execution via a PDF vulnerability differs from arbitrary code execution via a cable - what sort of magic allows the former case to bypass the security checks that the latter can't duplicate?
Re: (Score:2)
Re: (Score:2)
How often do you reboot your phone? And don't you want to connect it to your computer after you do anyway, to restore stuff?
Why would you need to restore after a reboot?
I don't restart my phone (Android) that much, but sometimes an app dies and leaves the phone in a less than desirable state (e.g., un-killable background tasks that eat the battery). I've never lost any data because of a restart.
Re: (Score:1)
Samething with ipad, but it happens every 2-3 weeks, so it is not that anoying really, I updated to untether the jailbreak
Ast weekend after some 6 months running on tetherd jailbreak and I had rebooted at most 3 times in that ammount of time
BTW the update was showing on itunes since saturday at least, I had to do a partial upgrade because of that
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
You must be thinking of older Windows Mobile devices from the era just before flash got cheap. They have only enough nonvolatile storage to hold the operating system and a handful of apps...
Re: (Score:2)
Have you tried killing the unused apps instead of rebooting?
Just wondering...
Re: (Score:2)
One of my big reasons for jailbreaking is installing Backgrounder and SwitcherMod to take over control of multitasking. I have it set to not background apps by default (except for a couple apps like Safari and ipod) and SwitcherMod to get rid of recently used apps in the switcher. That way it acts much more like a taskbar/dock of running apps rather than trying to hide which apps are running and which aren't. I'm smart enough to know the difference between running and not running and like being able to cont
Re: (Score:2)
> In short, misleading title is misleading.
And old meme is old.
Re: (Score:2)
This basically means that they are out of software zero day exploits.
Having a walled garden is definitely responsible for Apple's high level of security.
Nothing Like Bragging Rights (Score:2)
Re: (Score:2)
... and in what universe does any device go unmolested? That there are crackers is just a given at this point.
So it's a tethered jb... (Score:1)
The relevant question is: How many days until they come up with an untethered break? I give it no more than 2 weeks, tops.
Re: (Score:2)
Or Android devices made by assholes (read: Motorola, etc.) who lock down the bootloader.
Instead of an iPod touch (Score:2)
Hey! (Score:2)
I guess "iOS 4.3.4 Prevents Hacking and Jailbreaking" wasn't true after all.
Re: (Score:2)
I guess "iOS 4.3.4 Prevents Hacking and Jailbreaking" wasn't true after all.
It was for about 12 hours...
Re: (Score:2)
Not so much. "iOS 4.3.4 prevents you from hacking or jailbreaking..." would be better.
WebOS (Score:2)
It's a shame Sprint has abandoned the HPalm line. Hopefully it will gain traction on Verizon and ATT. No 'jailbreaking' necessary. The platform is open and easy to modify to your heart's content. HP actively recognizes, encourages, and works with the homebrew community.
http://www.webos-internals.org/wiki/Main_Page [webos-internals.org]
Apple did not push fix to break jailbreaking (Score:4, Insightful)
In two separate stories now, it has been put forth that Apple pushed out this fix with the mustache-twirling intent to stop jailbreaking.
Well obviously not, since the problem that lets tethered jailbreaking work is without issue. The REAL reason Apple "broke" untethered jailbreaking is that it was a gaping flaw in PDF handling that would let an attacker gain control of the system.
I realize Slashdot has a more general readership these days but surely anyone can see that leaving an exploit like that unlatched is bad. In fact other companies have been chastised for leaving holes like that open for too long, and rightfully so...
So please let us drop the pretense that every security patch is Apple out to stop jailbreaking. Apple in fact does not really care if you jailbreak, and is using it covertly to see what new features might be good to add to the platform by viewing the experimental jailbreak community... sometimes not so covertly as the case of them hiring the guy who did jailbroken notification handling to fix notification handling in iOS5! I can't think of a clearer signal that jailbreaking has at least covert approval within Apple.
Re: (Score:1)
Re: (Score:2)
It's better to be the cat in a cat-and-mouse game than the hangman in a hangman game.
Seems to me like that depends largely upon your point of view...
Re: (Score:2)
This drives a strong effort to locate and exploit these holes
But as others have noted Apple is not really pushing hard to fix security holes that require local access. this strikes a good balance between keeping the platform effectively open, while still fairly secure.
I chortled a little (Score:2)
When I saw that the IOS 4.3.4 Un-jailbreakable! [slashdot.org] story was still on the front page when this came out. And remains there as of this writing.
Re: (Score:3)
You wish death on Steve Jobs for removing security holes in his products?
Re:Hah (Score:4, Informative)
Is that what they're calling locking down a device these days?
By your logic, if the black helicopters showed up on your front lawn and hauled you and your family away to a detention camp they'd be "removing security holes".
In a way, you'd be right, too.
Remember what Ben Franklin said about security. If you're willing to give up your freedom for security, you don't deserve either. By Franklin's logic, Apple users deserve nada.
Re: (Score:1)
>
Remember what Ben Franklin said about security. If you're willing to give up your freedom for security, you don't deserve either. By Franklin's logic, Apple users deserve nada.
I have always felt this way. "It just works" is a good way to describe the way the Burmese regime works. Of course it just works, there is not allowed to be any dissention among the ranks. If the large population of iDiots that purport to have superior products, security, etc ad nauseum actually looked at everything they were giving up just to have their comfy blanket of apple security, they'd be a little disappointed.
Re: (Score:3)
Is that what they're calling locking down a device these days?
No, that is what we call removing arbitrary privileged code execution vulnerabilities in web browsers.
Re: (Score:2)
Is that what they're calling locking down a device these days?
No, that is what we call removing arbitrary privileged code execution vulnerabilities in web browsers.
Definitely. It's the same thing Google did with Android in 2008. They patched an exploit that was also used to jailbreak phones.
Re: (Score:2)
/. should really have a macro for that quote as much as it gets used here.
Type BFQ and autoexpand from there.
Re: (Score:3)
The security hole was real, and could be used to run arbitrary code on your phone, not necessarily to give you control over it.