Difference between revisions of "CVE-2021-30883"

From The iPhone Wiki
Jump to: navigation, search
(Add info about A14/DCP)
(Apparently iOS 14 on A14 doesn't work either (panics DCP))
Line 5: Line 5:
 
Unlike CVE-2021-30807, this vulnerability is apparently exploitable from the app sandbox without any special entitlement.
 
Unlike CVE-2021-30807, this vulnerability is apparently exploitable from the app sandbox without any special entitlement.
   
Saar's PoC only works on [[A10]]&ndash;[[A13]] devices. Apparently, iOS 15 on A14/A15 moved this code to the [[DCP]]<ref>Tweet from Adam Donenfeld (Zimperium): [https://twitter.com/doadam/status/1447647092055347209 This has been moved to the display coprocessor (DCP) starting from 15, at least on iPhone 12 (and most probably other ones as well)]</ref>. A small change to the PoC causes the DCP coprocessor to panic, which then panics the iOS kernel, but this is unlikely to allow exploiting the kernel.
+
Saar's PoC only works on [[A10]]&ndash;[[A13]] devices. Apparently, A14/A15 moved this code to the [[DCP]]<ref>Tweet from Adam Donenfeld (Zimperium): [https://twitter.com/doadam/status/1447647092055347209 This has been moved to the display coprocessor (DCP) starting from 15, at least on iPhone 12 (and most probably other ones as well)]</ref>. A small change to the PoC causes the DCP coprocessor to panic, which then panics the iOS kernel, but this is unlikely to allow exploiting the kernel.
 
(TODO: what about iOS14 on A14?)
 
   
 
== References ==
 
== References ==

Revision as of 23:40, 11 October 2021

On 11 October 2021, Apple released iOS 15.0.2 with a fix for CVE-2021-30883, a vulnerability in IOMobileFrameBuffer which allows kernel code execution, and has been exploited in the wild according to Apple. Note that is is not the same as CVE-2021-30807 which was fixed in 14.7.1.

Saar Amar quickly bindiff'd the kernel and wrote a blog post and PoC about this vulnerability.

Unlike CVE-2021-30807, this vulnerability is apparently exploitable from the app sandbox without any special entitlement.

Saar's PoC only works on A10A13 devices. Apparently, A14/A15 moved this code to the DCP[1]. A small change to the PoC causes the DCP coprocessor to panic, which then panics the iOS kernel, but this is unlikely to allow exploiting the kernel.

References

Tango Utilities-terminal.png This exploit article is a "stub", an incomplete page. Please add more content to this article and remove this tag.