toggle

AAPL Stock: 125.46 ( -0.54 )

Printed from http://www.macnn.com

Hacker unlocks iPhone 1.1.2 via new exploit

updated 12:10 pm EST, Fri February 8, 2008

New iPhone 1.1.2 unlock

An iPhone hacker has discovered a new way to unlock Apple's iPhone firmware version 1.1.2 without the need to downgrade to a prior firmware revision and then re-upgrade after unlocking the device. The unlock technique relies on a bug that allows hackers to erase the contents of memory within a range of specific addresses, coupled with a second bug that allows users to copy data before validation occurs.

"The first exploit I found, at around 4 AM last night, was the -0x20000 exploit," wrote George Hotz, the discoverer of the new unlock method. "I finally found a working exploit about 23 hours into my search for the software unlock. The explict addresses 0xA03D0000-0xA03F0000 will always erase."

Another user has posted a tutorial describing the process of jailbreaking and unlocking an iPhone, making use of the newly discovered exploit.




by MacNN Staff

POST TOOLS:

TAGS :

toggle

Comments

  1. gskibum3

    Joined: Dec 1969

    0

    Fire Under My Feet

    I better protect myself from this exploit by updating to 1.1.3. Oops. Never mind. I did the day it was released almost a month ago.

  1. dliup

    Joined: Dec 1969

    0

    unlock...

    This is nothing that will affect iPhone users without them knowing.

    Currently all iphone hackers work to unlock the phone, not for nefarious purposes.

  1. UberFu

    Joined: Dec 1969

    0

    so 2 things...

    First - Apple is probably NOT going to release a patch for the 1.1.2 exploit and tell you to upgrade to the 1.1.3 update_

    2nd - Does this exploit carry over to 1.1.3? Seeing as how it seems to be previously unknown and unused_

  1. Feathers

    Joined: Dec 1969

    0

    hackers...

    ...Isn't it time someone remembered the etymology of the word "hacker"? Any programmer may refer to him or herself as a hacker partly as they frequently must employ "hacks" to work around the limitations or otherwise in systems, applications, environments and so forth. Somewhere along the line, the term got hijacked (probably by Hollywood) to infer that it only describes programmers with nefarious intent.

  1. WiseWeasel

    Joined: Dec 1969

    0

    my hero!

    ... and there was much rejoicing. Yaaaay.

Login Here

Not a member of the MacNN forums? Register now for free.

toggle

Network Headlines

Follow us on Facebook

toggle

Most Popular

Advertisement

Recent Reviews

Prong PWR Case

Ultimately there's one thing we all want from smartphone accessories; we want options. When it comes to keeping our iPhone charged, w ...

iHome iBT74 Color Changing Bluetooth Speaker

There's no reason why your tech can't look good while doing what it was designed to do. That's the reason that sports cars look goo ...

Logitech Gaming Daedalus Prime Mouse

Logitech Gaming continues to expand upon its peripherals line, with each one looking to fit neatly into a breadth of gaming needs. Bui ...

toggle

Most Commented