0:00
what's going on youtube gsnorwright here
0:02
in today's video i have some great news
0:03
for those of you waiting for a jailbreak
0:07
and lower so a brand new vulnerability
0:09
that can be used for jailbreak purposes
0:11
has been released and of course ios
0:15
has also been released this video is
0:16
brought to you by any trans a software
0:18
that allows you to manage the content on
0:20
your device drag and drop files to your
0:22
device from your computer and of course
0:23
to backups and so on check it out in the
0:26
link below so if you go ahead in here
0:27
and check the versions that are
0:29
currently available for various devices
0:31
you can see that 15.0.2 is now also
0:34
available alongside with 15.0.1
0:37
now apple has pushed this update a
0:39
couple of hours ago and as you can see
0:41
here there's only one single patch i o
0:43
mobile frame buffer and it's from an
0:45
anonymous researcher but it says quote
0:47
an application may be able to execute
0:49
arbitrary code with kernel privileges
0:51
apple is aware of a report that this
0:53
issue may have been actively exploited
0:55
so it seems to have been an issue
0:57
exploited in the wild and security
0:59
researcher sar amar already has created
1:02
a proof of concept for this
1:03
vulnerability has released it to the
1:05
public explaining the vulnerability and
1:07
of course what they found i have no idea
1:09
how they did that since the patch has
1:11
been released a couple of hours ago so
1:13
they had to dis it they had to figure
1:15
out how it works create a proof of
1:16
concept that works and also write this
1:19
huge blog post in here in just a couple
1:21
of hours this is just more than we can
1:23
ask for in this community so saramar
1:26
posted here quote so another i o mfb
1:28
vulnerability was exploited in the wild
1:31
15.0.2 i bin lift the patch and build a
1:34
proof of concept and because it's a
1:35
great bug i just finished writing a
1:37
short blog post with the tech details to
1:39
share the knowledge check it out in here
1:42
and they posted a picture of the panic
1:44
log basically showing that their proof
1:45
of concept works and apparently writing
1:47
ace to the memory basically capital a
1:50
that's what hex 41 is what caught my
1:52
attention is the fact that they mention
1:54
here quote this attack surface is highly
1:56
interesting because it's accessible from
1:58
the app sandbox so it's great for
2:01
jailbreaks and many other processes
2:02
making it good candidates for lpes or
2:05
local privilege escalation exploits in
2:07
chains web content and so on so
2:09
basically this can be used for jailbreak
2:11
purposes the code that has been posted
2:14
is apparently a proof of concept not a
2:15
full exploit but this can be created as
2:18
an exploit and of course used for
2:20
jailbreak purposes so it says here quote
2:22
the proof of concepts i have shown here
2:24
work all the same on 14.7.1 to 15.0.1
2:28
it's probably true for much earlier
2:30
versions as well but i checked only on
2:32
14.7.1 and newer i checked it also on
2:35
iphone 11 pro max ios 15.0 iphone 11 pro
2:38
max being a 13. so yeah this is actually
2:41
great because this means that it works
2:42
on newer devices as well and if
2:44
exploited this would definitely be
2:46
pretty good for jailbreak purposes
2:48
especially since this was patched on
2:50
15.0.2 so it works on 15.0.1 15.0 14.8
2:55
14.7.1 and very likely 14.7 all the way
2:59
down to 14.4 as well so with all the
3:01
information currently available here
3:03
thanks to sarah mars generosity we can
3:05
now create an exploit around this and
3:07
possibly use this for uncover or taurine
3:09
in combination with other things so this
3:11
is definitely a great thing this patch
3:13
contained only one vulnerability but a
3:15
great vulnerability for the jailbreak
3:17
community so while people take a look at
3:19
this and maybe create an exploit for it
3:21
what i would definitely recommend you is
3:23
to stay below 15.0.2 stay on 15.0.1 or
3:27
lower preferably stay on 14.8 or lower
3:30
because as i mentioned in my other video
3:33
15.0 and newer basically include a
3:35
different file system that would panic
3:37
your device if modified so that would be
3:39
a completely new hurdle for the
3:41
jailbreak community to pass now 14.8
3:44
doesn't have that so it would be much
3:46
easier to jailbreak so i would
3:47
definitely recommend it to stay on 14.8
3:49
or lower however thanks to sar amar now
3:52
we have yet another powerful
3:54
vulnerability and compared to others
3:56
that have been released this one is
3:57
known to be usable for jailbreak
3:59
purposes because it's accessible from
4:01
the sandbox which makes it great for
4:03
that task all we need now is a jailbreak
4:05
exploit around this which of course
4:07
would use all the knowledge in this
4:08
posting here so it shouldn't exactly be
4:10
very very hard and we might be able to
4:13
use this pretty well for jailbreak
4:14
purposes so yeah i will keep you
4:16
informed when that happens i will keep
4:17
you informed with the progress for now
4:19
this is just news but of course i will
4:21
make a video once we have more info
4:23
thank you for watching imgs now till the
4:25
next time subscribe to stay updated and