Difference between revisions of "AT+XAPP Vulnerability"

From The iPhone Wiki
Jump to: navigation, search
(Implementation)
(Exploit)
Line 11: Line 11:
 
There is a stack overflow in the AT+XAPP‭="..." ‬command‭, ‬which allows unsigned code execution on the X-Gold 608‭.‬
 
There is a stack overflow in the AT+XAPP‭="..." ‬command‭, ‬which allows unsigned code execution on the X-Gold 608‭.‬
   
at+xapp‭="‬00000000000000000000000000000000000000000000000000000‭"‬
+
at+xapp‭="‬0000111122223333444455556666777788889999000011112222"‬
   
 
applying a string of more than 52‭ ‬characters will trigger the overflow
 
applying a string of more than 52‭ ‬characters will trigger the overflow

Revision as of 17:11, 22 June 2010

Used as an injection vector for the current iPhone 3G and iPhone 3GS unlock payloads‭ - ‬ultrasn0w 0.93‭. ‬Currently available in all baseband versions until 05.13.04‭.‬ ‭

Credit

sherif_hashim

Exploit

There is a stack overflow in the AT+XAPP‭="..." ‬command‭, ‬which allows unsigned code execution on the X-Gold 608‭.‬

at+xapp‭="‬0000111122223333444455556666777788889999000011112222"‬

applying a string of more than 52‭ ‬characters will trigger the overflow ‭

Implementation

The exploit was used by iPhone Dev Team in Ultrasn0w 0.93‭ which is able to unlock 4.26.08‭, ‬5.11.07‭, ‬5.12.01‭ ‬and 5.13.04‭ ‬BB firmwares


Category‭: ‬Baseband Exploits