Pod2G has found another exploit for the iPod touch 2G that may be used to provide a jailbreak for both MC and non-MC models.
A heap overflow exists in the iPod touch 2G (both old and new) bootrom's DFU Mode when sending a USB control message of request type 0xA1, request 0x1.
On newer devices, the same USB message triggers a double free() when the image upload is marked as finished, also rebooting the device (but that's not exploitable because the double free() happens in a row). posixninja analyzed and explained this one.
This exploit is different from the one being used for the SHAtter jailbreak.

*thanks iclarified*
Our new Forum is now open here or on the top tabs marks Forums, please register and post..
For the latest tech stories, follow us on Twitter at
@iphonepixelpost or @limerain_com
www.iPodSets.com
- Posted using my iPhone 4
No comments:
Post a Comment