The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "P0sixspwn"
(→Exploits: links and ref comments on exploit list) |
(1.0.3 for Windows.) |
||
Line 1: | Line 1: | ||
{{lowercase}} |
{{lowercase}} |
||
− | '''p0sixspwn''' is an [[untethered jailbreak]] for iOS 6.1.3-6.1.5 by [[User:winocm|winocm]], [[User:Ih8sn0w|iH8sn0w]] and [https://twitter.com/SquiffyPwn SquiffyPwn]. It was initially made available as an Cydia package on [[Saurik]]'s repo to untether already jailbroken devices. It works with all devices that support iOS 6.1.3-6.1.5, except for Apple TV 3. On 30 December 2013, a Mac OS X program was released to perform a jailbreak. A Windows |
+ | '''p0sixspwn''' is an [[untethered jailbreak]] for iOS 6.1.3-6.1.5 by [[User:winocm|winocm]], [[User:Ih8sn0w|iH8sn0w]] and [https://twitter.com/SquiffyPwn SquiffyPwn]. It was initially made available as an Cydia package on [[Saurik]]'s repo to untether already jailbroken devices. It works with all devices that support iOS 6.1.3-6.1.5, except for Apple TV 3. On 30 December 2013, a Mac OS X program was released to perform a jailbreak. A Windows program was released on 3 January 2014. |
==Changelog== |
==Changelog== |
||
Line 20: | Line 20: | ||
|- |
|- |
||
! 1.0.0 |
! 1.0.0 |
||
− | | |
+ | | rowspan="3" | [[wikipedia:OS X|Mac OS X]] |
| <code>b5a66f4e58ab4c813fc851d479b28188eb5115ec</code> |
| <code>b5a66f4e58ab4c813fc851d479b28188eb5115ec</code> |
||
| style="text-decoration: line-through;" | [https://mega.co.nz/#!0xtw0DAT!YVZmNXsn-kl1kH655zgpMGz8hSVVgk8FU3qlTPNfSdU Mega] |
| style="text-decoration: line-through;" | [https://mega.co.nz/#!0xtw0DAT!YVZmNXsn-kl1kH655zgpMGz8hSVVgk8FU3qlTPNfSdU Mega] |
||
Line 35: | Line 35: | ||
| <code>259e95fd16468260c8831ca17186f50b7d14ba41</code> |
| <code>259e95fd16468260c8831ca17186f50b7d14ba41</code> |
||
| [https://mega.co.nz/#!DVtmGLqa!BX2-OQUliBcfdlenMLa93mKxk244KpD9Z71p_DAeil8 Mega] |
| [https://mega.co.nz/#!DVtmGLqa!BX2-OQUliBcfdlenMLa93mKxk244KpD9Z71p_DAeil8 Mega] |
||
− | | |
+ | | rowspan="2" | |
* Resolves issues with LTE/data. |
* Resolves issues with LTE/data. |
||
+ | |- |
||
+ | ! 1.0.3 |
||
+ | | [[wikipedia:Microsoft Windows|Windows]] |
||
+ | | <code>060c95cda0e5ad861bd225ca19324e6ebd3c0a5d</code> |
||
+ | | [https://mega.co.nz/#!x0sk1SjB!S86WIGnifrgVhf5aoFQiPHl5aMJvS3miIeTTy9pLL_w Mega] |
||
+ | | class="nobborderplz" rowspan="2" | |
||
+ | * Initial release for Windows. |
||
|} |
|} |
||
Revision as of 20:36, 3 January 2014
p0sixspwn is an untethered jailbreak for iOS 6.1.3-6.1.5 by winocm, iH8sn0w and SquiffyPwn. It was initially made available as an Cydia package on Saurik's repo to untether already jailbroken devices. It works with all devices that support iOS 6.1.3-6.1.5, except for Apple TV 3. On 30 December 2013, a Mac OS X program was released to perform a jailbreak. A Windows program was released on 3 January 2014.
Contents
Changelog
- 1.3-2 Fixes iMessage, LTE issues and Apple TV 2G support.
- 1.2-1 Various bug fixes.
- 1.1-3 Automatically reboot after two minutes if device did not boot due to 60 seconds was too quick. (iH8sn0w's repo only)
- 1.1-2 Automatically reboot after one minute if device did not boot due to 30 seconds was too quick. (iH8sn0w's repo only)
- 1.1-1 Automatically reboot after 30 seconds if device did not boot. (iH8sn0w's repo only)
- 1.0-9 iPhone 4 GSM boot loop fix
- 1.0-5 the initial release of the untether
Download
Version | OS | SHA-1 Hash | Download | Changes |
---|---|---|---|---|
1.0.0 | Mac OS X | b5a66f4e58ab4c813fc851d479b28188eb5115ec
|
Mega |
|
1.0.1 | ae5b3907660b161b2ff94a2e2cfef97195404a89
|
Mega |
| |
1.0.2 | 259e95fd16468260c8831ca17186f50b7d14ba41
|
Mega |
| |
1.0.3 | Windows | 060c95cda0e5ad861bd225ca19324e6ebd3c0a5d
|
Mega |
|
Exploits
- posix_spawn kernel information leak (by i0n1c)
- mach_msg_ool_descriptor_ts for heap shaping
- dyld S_ATTR_LOC_RELOC/function reexport (also used in evasi0n7) (same as AMFID_code_signing_evasion?)
- DeveloperDiskImage race condition (by comex)
- MobileBackup2 arbitrary symbolic link restore (also used in evasi0n) (same as Symbolic Link Vulnerability?, fixed in iOS7.1b2)
- launchd.conf (same as launchd.conf untether?)