Apple Fixes Untethered Exploit In iOS 4.3.4; So Don’t Expect Untethered iOS 4.3.4 Jailbreak To Be Released Anytime Soon

News | Friday July 15 2011 2:54 PM | Comments (0) Tags: , , , , , , , ,

But it supports only a tethered jailbreak, which means that you need to connect your iOS device to the computer on every reboot.
has tweeted that it may not be possible to release an untethered jailbreak for iOS 4.3.4 anytime soon.
In a series of tweets he has revealed that Apple has also fixed the untether exploit in iOS 4.3.4:
Don’t expect a iOS 4.3.4 untether anytime soon.
In a way it is nice to see that Apple instead of merely fixing vulns add more mitigation checks. But for jailbreakers this suxx.
The dynamic linker performs additional checks on the mach-o header to stop a class of attacks against the dynamic linker.
This is how Apple broke your hearts: ADD.W R3, R11, #0xFFFFFFFF – CMP R3, #9 – BHI get_out_of_here
Actually no. That code is the code that fixes the untether exploit.
Apple has also fixed the security vulnerability used by Comex in JailbreakMe 3.0 to jailbreak iPhone , iPad and iPod Touch.
So the only option you have if you want to enjoy an untethered jailbreak would be to avoid upgrading to iOS 4.3.4 and ensure that you have taken a backup of the SHSH blobs via 
, so you can downgrade to an older jailbreakable iOS version if required.
Apple has again upped the ante in its cat and mouse game against the jailbreaking community. It has already made it difficult if not impossible to
on the latest basebands and with iOS 4.3.4 update it looks like it is also targeting jailbreaking.
. It was good to see Comex requesting jailbreakers using
. The jailbreaking community probably needs to do more to prevent it altogether to get rid of the stigma of piracy associated with jailbreaking.
What are your thoughts? Let us know in the comments.

No Comments »

No comments yet.

RSS feed. TrackBack URI

Leave a comment

You must be logged in to post a comment.