evasi0n

From The iPhone Wiki
Revision as of 00:54, 11 February 2013 by 5urd (talk | contribs)
Jump to: navigation, search
greenpois0n

evasi0n is a jailbreak tool that can be used to jailbreak (untethered) iOS 6.0-6.1 on all supported devices, excluding the Apple TV 3G. It was releasd on 4 Feburary 2013 by its developers, evad3rs, and supports Windows, OS X, and Linux (x86 and x86_64).

Supported Devices

As of evasi0n's release, the only unsupported device is the Apple TV 3G, since the kernel is still missing a injector vector to run unsigned code. All other devices on iOS 6.0-6.1 are supported (as well as iOS 5.2 for the Apple TV 2G).

Version History

Verbatim change logs are available in the download as a text file.

Version Release Date Changes
1.0 04 Feb 2013
  • Initial Release
1.1 06 Feb 2013
  • Prevents Weather app from appearing on iPads
  • Mitigated the long reboot issue
  • Fixed freezing issue with after connecting multiple devices
  • Fixed blinking of the jailbreak instructions on OS X
  • OS X app now Codesigned
1.2 08 Feb 2013
  • Disables OTA updates
  • Correct timezone issue in evasi0n binary if client fails to correct it

Download

Version Release Date OS SHA-1 Hash Download
1.0 04 Feb 2013 Linux c9e4b15a161b89f0e412721f471c5f8559b6054f Google Sites Box Mega RapidShare
Mac OS X 23f99a0d65e71fd79ff072b227f0ecb176f0ffa8 Google Sites Box Mega RapidShare
Windows 2ff288e1798b4711020e9dd7f26480e57704d8b2 Google Sites Box Mega RapidShare
1.1 06 Feb 2013 Linux 6c06a6be87e003eee470eb749b42ffbaafcc9e62 Google Sites Box Mega RapidShare
Mac OS X ae9d20bc927976a1f55089cd80afca48de0f7a2e Google Sites Box Mega RapidShare
Windows 4225b01afd4a4fd1277565954964bd3310ad8b5f Google Sites Box Mega RapidShare
1.2 08 Feb 2013 Linux 2e1d1f6c7e6ca775860df03298dce3b0d798658a Google Sites Box Mega RapidShare
Mac OS X 8f91aba478ad28bda800dc5c303be1699fcfb800 Google Sites Box Mega RapidShare
Windows 9942559caf779da6526b9fd0e207d21554a8a9cf Google Sites Box Mega RapidShare

Exploits

evasi0n takes advantage of at least five distinct new vulnerabilities:

Code

launchd.conf

bsexec .. /sbin/mount -u -o rw,suid,dev /
setenv DYLD_INSERT_LIBRARIES /private/var/evasi0n/amfi.dylib
load /System/Library/LaunchDaemons/com.apple.MobileFileIntegrity.plist
bsexec .. /private/var/evasi0n/evasi0n
unsetenv DYLD_INSERT_LIBRARIES
bsexec .. /bin/rm -f /private/var/evasi0n/sock
bsexec .. /bin/ln -f /var/tmp/launchd/sock /private/var/evasi0n/sock

External Links

Gp.png This jailbreaking article is a "stub", an incomplete page. Please add more content to this article and remove this tag.