Difference between revisions of "IOUSBDeviceFamily Vulnerability"

From The iPhone Wiki
Jump to: navigation, search
(initial page)
(No difference)

Revision as of 23:10, 25 February 2013

This kernel vulnerability comes from the com.apple.iokit.IOUSBDeviceInterface driver. There are several methods that accept a pipe object pointer from user space, but do not validate the pointer except for testing if it is non-null. An application that can communicate with USB devices (holding com.apple.security.device.usb entitlement) can call IOUSBDeviceInterface functions directly and give them a malformed pipe object which can result in arbitrary code execution if the memory referenced by the given pip object pointer can be controlled from user space. evasi0n uses function 15 (stallPipe) for exploitation.

TODO: Describe evasi0n exploitation in detail here.

See also

References