Difference between revisions of "Alloc8 Exploit"

From The iPhone Wiki
Jump to: navigation, search
(clean up)
m (Added alloc8 CVE ID)
 
(5 intermediate revisions by 5 users not shown)
Line 1: Line 1:
 
{{lowercase}}
 
{{lowercase}}
The '''alloc8 exploit''' is a [[bootrom]] exploit used to run unsigned code on the both the [[Bootrom 359.3.2|new bootrom]] and the [[Bootrom 359.3|old bootrom]] [[N88AP|iPhone 3GS]] (and thereby [[jailbreak]] it). It is the first public [[Untethered jailbreak|untethered]] [[bootrom]] exploit for the [[Bootrom 359.3.2|new bootrom]] iPhone 3GS.
+
The '''alloc8 exploit''' is a [[bootrom]] exploit with a CVE ID of CVE-2019-9536 used to run unsigned code on both the [[Bootrom 359.3.2|new bootrom]] and the [[Bootrom 359.3|old bootrom]] [[N88AP|iPhone 3GS]] (and thereby [[jailbreak]] it). It is the first public [[Untethered jailbreak|untethered]] [[bootrom]] exploit for the [[Bootrom 359.3.2|new bootrom]] iPhone 3GS.
   
'''axi0mX''', the discoverer of the exploit, produced a detailed analysis of alloc8, which was published on [https://github.com/axi0mX/alloc8/blob/master/README GitHub].
+
[[User:axi0mX|axi0mX]] published a detailed analysis of alloc8 at [https://github.com/axi0mX/alloc8/blob/master/README GitHub] following his discovery of the exploit.
   
 
[[ipwndfu]] is currently the primary and most simple way of using the alloc8 exploit.
 
[[ipwndfu]] is currently the primary and most simple way of using the alloc8 exploit.

Latest revision as of 23:03, 21 October 2020

The alloc8 exploit is a bootrom exploit with a CVE ID of CVE-2019-9536 used to run unsigned code on both the new bootrom and the old bootrom iPhone 3GS (and thereby jailbreak it). It is the first public untethered bootrom exploit for the new bootrom iPhone 3GS.

axi0mX published a detailed analysis of alloc8 at GitHub following his discovery of the exploit.

ipwndfu is currently the primary and most simple way of using the alloc8 exploit.