toggle

AAPL Stock: 97.55 ( + 2.83 )

Printed from http://www.macnn.com

Hacker unlocks iPhone 1.1.2 via new exploit

updated 12:10 pm EST, Fri February 8, 2008

New iPhone 1.1.2 unlock

An iPhone hacker has discovered a new way to unlock Apple's iPhone firmware version 1.1.2 without the need to downgrade to a prior firmware revision and then re-upgrade after unlocking the device. The unlock technique relies on a bug that allows hackers to erase the contents of memory within a range of specific addresses, coupled with a second bug that allows users to copy data before validation occurs.

"The first exploit I found, at around 4 AM last night, was the -0x20000 exploit," wrote George Hotz, the discoverer of the new unlock method. "I finally found a working exploit about 23 hours into my search for the software unlock. The explict addresses 0xA03D0000-0xA03F0000 will always erase."

Another user has posted a tutorial describing the process of jailbreaking and unlocking an iPhone, making use of the newly discovered exploit.




by MacNN Staff

POST TOOLS:

TAGS :

toggle

Comments

  1. gskibum3

    Joined: Dec 1969

    0

    Fire Under My Feet

    I better protect myself from this exploit by updating to 1.1.3. Oops. Never mind. I did the day it was released almost a month ago.

  1. dliup

    Joined: Dec 1969

    0

    unlock...

    This is nothing that will affect iPhone users without them knowing.

    Currently all iphone hackers work to unlock the phone, not for nefarious purposes.

  1. UberFu

    Joined: Dec 1969

    0

    so 2 things...

    First - Apple is probably NOT going to release a patch for the 1.1.2 exploit and tell you to upgrade to the 1.1.3 update_

    2nd - Does this exploit carry over to 1.1.3? Seeing as how it seems to be previously unknown and unused_

  1. Feathers

    Joined: Dec 1969

    0

    hackers...

    ...Isn't it time someone remembered the etymology of the word "hacker"? Any programmer may refer to him or herself as a hacker partly as they frequently must employ "hacks" to work around the limitations or otherwise in systems, applications, environments and so forth. Somewhere along the line, the term got hijacked (probably by Hollywood) to infer that it only describes programmers with nefarious intent.

  1. WiseWeasel

    Joined: Dec 1969

    0

    my hero!

    ... and there was much rejoicing. Yaaaay.

Login Here

Not a member of the MacNN forums? Register now for free.

toggle

Network Headlines

toggle

Most Popular

MacNN Sponsor

Recent Reviews

D-Link Wi-Fi Smart Plug

Home automation fans have been getting their fair share of gadgets and accessories in the last few years. Starting with light bulbs, a ...

Razer Kraken Pro headset

Gaming headphones are a challenge to get right, for a long list of reasons that are unique to the consumer buying them. Some shoppers ...

Patriot Aero Wireless Mobile Drive

Regardless of how large a tablet you buy, you always want more space. There's always one more movie or another album you'd cram on, ...

toggle

Most Commented