Apple Inc is failed again and its now facing a lot of problems.The latest news is that the Apple iOS 5.0.1 is been hacked and untethered by two security holes.A security researcher has released a tool to untether devices running iOS 5.0.1 by using two different security vulnerabilities in Apple’s flagship mobile operating system. iOS is constantly hacked within minutes. It is a swiss cheese operating system.
The hacker has pod2G namely diesbezülich released a video that demonstrates using the untethered jailbreak iOS detail. This demo, however, was carried out on an iPod Touch 3G and it was a matter still not quite sure if this jailbreak method will work on the new iPhone 4S or on the iPad 2.
The ‘Corona’ jailbreak tool latest exploits a pair of iOS security vulnerabilities to bypass Apple’s code-signing requirements. The jailbreak tool has been released at the greenpois0n and the iPhone Dev Team sites.
By the past, the trick security researchers used was to include the untethering payload as a data page (as opposed to a code page) in the Mach-O binary. The advantage of a data page was that the Macho-O loader didn’t check its authenticity.ROP is used so that code execution happens without writing executable code but rather by utilizing existing signed code in the dyld cache.To have the ROP started by the Mach-O loader,there are two types of exploit.
1. Interposition exploit
2. Initializer exploit
The latest jailbreak, dubbed Corona,exploits a pair of security holes a format string vulnerability and a heap overflow in the kernel to bypass Apple’s code-signing requirements and untether devices.
Check out the video below for full specification.