toggle

AAPL Stock: 109.27 ( -1.1 )

Printed from http://www.macnn.com

Hacker unlocks iPhone 1.1.2 via new exploit

updated 12:10 pm EST, Fri February 8, 2008

New iPhone 1.1.2 unlock

An iPhone hacker has discovered a new way to unlock Apple's iPhone firmware version 1.1.2 without the need to downgrade to a prior firmware revision and then re-upgrade after unlocking the device. The unlock technique relies on a bug that allows hackers to erase the contents of memory within a range of specific addresses, coupled with a second bug that allows users to copy data before validation occurs.

"The first exploit I found, at around 4 AM last night, was the -0x20000 exploit," wrote George Hotz, the discoverer of the new unlock method. "I finally found a working exploit about 23 hours into my search for the software unlock. The explict addresses 0xA03D0000-0xA03F0000 will always erase."

Another user has posted a tutorial describing the process of jailbreaking and unlocking an iPhone, making use of the newly discovered exploit.




by MacNN Staff

POST TOOLS:

TAGS :

toggle

Comments

  1. gskibum3

    Joined: Dec 1969

    0

    Fire Under My Feet

    I better protect myself from this exploit by updating to 1.1.3. Oops. Never mind. I did the day it was released almost a month ago.

  1. dliup

    Joined: Dec 1969

    0

    unlock...

    This is nothing that will affect iPhone users without them knowing.

    Currently all iphone hackers work to unlock the phone, not for nefarious purposes.

  1. UberFu

    Joined: Dec 1969

    0

    so 2 things...

    First - Apple is probably NOT going to release a patch for the 1.1.2 exploit and tell you to upgrade to the 1.1.3 update_

    2nd - Does this exploit carry over to 1.1.3? Seeing as how it seems to be previously unknown and unused_

  1. Feathers

    Joined: Dec 1969

    0

    hackers...

    ...Isn't it time someone remembered the etymology of the word "hacker"? Any programmer may refer to him or herself as a hacker partly as they frequently must employ "hacks" to work around the limitations or otherwise in systems, applications, environments and so forth. Somewhere along the line, the term got hijacked (probably by Hollywood) to infer that it only describes programmers with nefarious intent.

  1. WiseWeasel

    Joined: Dec 1969

    0

    my hero!

    ... and there was much rejoicing. Yaaaay.

Login Here

Not a member of the MacNN forums? Register now for free.

toggle

Network Headlines

Follow us on Facebook

toggle

Most Popular

Advertisement

Recent Reviews

Blue Yeti Studio

Despite being very familiar with Blue Microphones' lower-end products -- we've long recommended the company's Snowball line of mics ...

ZTE Spro 2 Smart Projector

Home theaters are becoming more and more accessible these days, but maybe you've been a bit wary about buying a home projector. And h ...

MSI Geforce GTX 970 100ME

When Nvidia announced a new line of video cards in September 2014, many people thought things would continue to be business as usual i ...

toggle

Most Commented