toggle

AAPL Stock: 98.53 ( -0.65 )

Printed from http://www.macnn.com

Hacker unlocks iPhone 1.1.2 via new exploit

updated 12:10 pm EST, Fri February 8, 2008

New iPhone 1.1.2 unlock

An iPhone hacker has discovered a new way to unlock Apple's iPhone firmware version 1.1.2 without the need to downgrade to a prior firmware revision and then re-upgrade after unlocking the device. The unlock technique relies on a bug that allows hackers to erase the contents of memory within a range of specific addresses, coupled with a second bug that allows users to copy data before validation occurs.

"The first exploit I found, at around 4 AM last night, was the -0x20000 exploit," wrote George Hotz, the discoverer of the new unlock method. "I finally found a working exploit about 23 hours into my search for the software unlock. The explict addresses 0xA03D0000-0xA03F0000 will always erase."

Another user has posted a tutorial describing the process of jailbreaking and unlocking an iPhone, making use of the newly discovered exploit.




by MacNN Staff

POST TOOLS:

TAGS :

toggle

Comments

  1. gskibum3

    Joined: Dec 1969

    0

    Fire Under My Feet

    I better protect myself from this exploit by updating to 1.1.3. Oops. Never mind. I did the day it was released almost a month ago.

  1. dliup

    Joined: Dec 1969

    0

    unlock...

    This is nothing that will affect iPhone users without them knowing.

    Currently all iphone hackers work to unlock the phone, not for nefarious purposes.

  1. UberFu

    Joined: Dec 1969

    0

    so 2 things...

    First - Apple is probably NOT going to release a patch for the 1.1.2 exploit and tell you to upgrade to the 1.1.3 update_

    2nd - Does this exploit carry over to 1.1.3? Seeing as how it seems to be previously unknown and unused_

  1. Feathers

    Joined: Dec 1969

    0

    hackers...

    ...Isn't it time someone remembered the etymology of the word "hacker"? Any programmer may refer to him or herself as a hacker partly as they frequently must employ "hacks" to work around the limitations or otherwise in systems, applications, environments and so forth. Somewhere along the line, the term got hijacked (probably by Hollywood) to infer that it only describes programmers with nefarious intent.

  1. WiseWeasel

    Joined: Dec 1969

    0

    my hero!

    ... and there was much rejoicing. Yaaaay.

Login Here

Not a member of the MacNN forums? Register now for free.

toggle

Network Headlines

toggle

Most Popular

MacNN Sponsor

Recent Reviews

Tylt Energi 2K Travel Charger

Backup batteries and device chargers are objects that many users take for granted. They often only one-dimensional in functionality, r ...

ActvContent Sync Smartband

Smartbands of all sorts are hitting the market. Some build on the buzz around fitness trackers, while others offer simpler features fo ...

RocketStor 6324L Thunderbolt 2 eSATA bridge

Like it or not, the shift to Thunderbolt is underway. The connection is extremely flexible, allowing for video and data to co-habitate ...

toggle

Most Commented