Apple ha bloqueado el jailbreak Taig con el lanzamiento de iOS 8.1.3, de acuerdo con un documento de seguridad publicado por Apple . Un total de cuatro huecos de seguridad han sido cerrados y acreditados al Equipo de Jailbreak “Taig”

  • dyld
    Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
    Impact: A local user may be able to execute unsigned code
    Description: A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed through improved validation of segment sizes.
    CVE-ID
    CVE-2014-4455 : TaiG Jailbreak Team
  • AppleFileConduit
    Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
    Impact: A maliciously crafted afc command may allow access to protected parts of the filesystem
    Description: A vulnerability existed in the symbolic linking mechanism of afc. This issue was addressed by adding additional path checks.
    CVE-ID
    CVE-2014-4480 : TaiG Jailbreak Team
  • IOHIDFamily
    Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
    Impact: A malicious application may be able to execute arbitrary code with system privileges
    Description: A buffer overflow existed in IOHIDFamily. This issue was addressed through improved size validation.
    CVE-ID
    CVE-2014-4487 : TaiG Jailbreak Team
  • Kernel
    Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
    Impact: Maliciously crafted or compromised iOS applications may be able to determine addresses in the kernel
    Description: The mach_port_kobject kernel interface leaked kernel addresses and heap permutation value, which may aid in bypassing address space layout randomization protection. This was addressed by disabling the mach_port_kobject interface in production configurations.
    CVE-ID
    CVE-2014-4496 : TaiG Jailbreak Team

Sera solo cuestión de tiempo para ver nuevamente una nueva herramienta de Jailbreak o porque no una actualización de las ya disponibles… Veremos!