Difference between revisions of "Pwnage 2.0"

From The iPhone Wiki
Jump to: navigation, search
Line 1: Line 1:
This exploit in the [[S5L8900]] bootrom is really the ultimate exploit, since it allows unsigned code to be run at the lowest level. It is available in all S5L8900 devices - iPhone, iPod Touch and iPhone 3G.
+
This exploit in the [[S5L8900]] [[VROM (S5L8900)|bootrom]] is really the ultimate exploit, since it allows unsigned code to be run at the lowest level. It is available in all devices that use the [[S5L8900]] - [[iPhone]], [[iPod Touch]] and [[iPhone 3G]].
   
 
==Credit==
 
==Credit==

Revision as of 00:55, 13 October 2009

This exploit in the S5L8900 bootrom is really the ultimate exploit, since it allows unsigned code to be run at the lowest level. It is available in all devices that use the S5L8900 - iPhone, iPod Touch and iPhone 3G.

Credit

The dev team

Exploit

There is a stack overflow in the certificate parsing code. By passing a malformed certificate, unsigned code can be run.

Implementations