July 28, 2014

Apple Releases iOS 4.3.4 to Fix Vulnerabilities – Jailbreakers Quick to React

(LiveHacking.Com) — Apple has released iOS 4.3.4 for the iPhone 3GS, the iPhone 4 (GSM model), the iPod touch (3rd generation and later) and for the iPad. The main purpose of iOS 4.3.4 is to close a hole in the PDF viewer which is used by JailBreakMe.com. It allowed users to jailbreak any iDevice (including iPad 2) through the website.

Specifically iOS 4.3.4 deals with the following security issues:

  • Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution. – A buffer overflow exists in FreeType’s handling of TrueType fonts. Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution.
  • Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution. – A signedness issue exists in FreeType’s handling of Type 1 fonts. Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution.
  • Malicious code running as the user may gain system privileges. – An invalid type conversion issue exists in the use of IOMobileFrameBuffer queueing primitives, which may allow malicious code running as the user to gain system privileges.
The update renders the JailBreakMe.com jail break useless. However users running 4.3.3 can still use the site to jailbreak their devices. However the Redmond Pie web site has posted details on a tethered jailbreak for iOS 4.3.4 using the PwnageTool. A tethered jailbreak means that if your device loses power or restarts then you would have to boot it into the jailbroken state again while connected to your desktop computer.
Share and Enjoy:
  • Print
  • Digg
  • StumbleUpon
  • del.icio.us
  • Facebook
  • Yahoo! Buzz
  • Twitter
  • Google Bookmarks