آبل تغلق ثغرات جيلبريك iOS 8.4 الخاص بفريق TaiG كما كان متوقعاً، قد فعلتها آبل مع إصدار نظامها الجديد iOS 8.4.1 يوم الخميس. حيث كشفت عن التفاصيل الأمنية الخاصة بالنظام, وكما نلاحظ تم إغلاق الثغرات التي كان الجيلبريك الخاص بفريق TaiG يعتمد عليها. ولا حاجة للقول أنه يجب عليك الابتعاد عن تحديث iOS 8.4.1 الجديد إن كنت مهتماً بعمل جيلبريك لجهازك الايفون أو الايباد. وهاهي التفاصيل الأمنية المتعلقة بالثغرات التي استغلها جيلبريك TaiG الأخير: AppleFileConduitAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A maliciously crafted afc command may allow access to protected parts of the filesystemDescription: An issue existed in the symbolic linking mechanism of afc. This issue was addressed by adding additional path checks.CVE-ID CVE-2015-5746 : evad3rs, TaiG Jailbreak Team Air TrafficAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: AirTraffic may have allowed access to protected parts of the filesystemDescription: A path traversal issue existed in asset handling. This was addressed with improved validation.CVE-ID CVE-2015-5766 : TaiG Jailbreak Team BackupAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A malicious application may be able to create symlinks to protected regions of the diskDescription: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization.CVE-ID CVE-2015-5752 : TaiG Jailbreak Team Code SigningAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A malicious application may be able to execute unsigned codeDescription: An issue existed that allowed unsigned code to be appended to signed code in a specially crafted executable file. This issue was addressed through improved code signature validation.CVE-ID CVE-2015-3806 : TaiG Jailbreak Team Code SigningAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A specially crafted executable file could allow unsigned, malicious code to executeDescription: An issue existed in the way multi-architecture executable files were evaluated that could have allowed unsigned code to be executed. This issue was addressed through improved validation of executable files.CVE-ID CVE-2015-3803 : TaiG Jailbreak Team Code SigningAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A local user may be able to execute unsigned codeDescription: A validation issue existed in the handling of Mach-O files. This was addressed by adding additional checks.CVE-ID CVE-2015-3802 : TaiG Jailbreak Team IOHIDFamilyAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A local user may be able to execute arbitrary code with system privilegesDescription: A buffer overflow issue existed in IOHIDFamily. This issue was addressed through improved memory handling.CVE-ID CVE-2015-5774 : TaiG Jailbreak Team كما نرى، فقد أعطت آبل الفضل لفريق جيلبريك TaiG عدة مرات في ملاحظاتها الأمنية. كما يمكنك الإطلاع على جميع الملاحظات الأمنية الخاصة بنظام iOS 8.4.1 الجديد عبر الضغط هنا. منقول للاهمية |
الساعة الآن 02:10 AM |
Powered by vBulletin® Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO 3.5.2 TranZ By
Almuhajir