Jailbreak Software Download Ios 11.1 About the Security Content of Ios 11.1
Total Page:16
File Type:pdf, Size:1020Kb
jailbreak software download ios 11.1 About the security content of iOS 11.1. This document describes the security content of iOS 11.1. About Apple security updates. For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page. For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key. Apple security documents reference vulnerabilities by CVE-ID when possible. iOS 11.1. Released October 31, 2017. CoreText. Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation. Impact: Processing a maliciously crafted text file may lead to an unexpected application termination. Description: A denial of service issue was addressed through improved memory handling. CVE-2017-13849: Ro of SavSec. Kernel. Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation. Impact: An application may be able to execute arbitrary code with kernel privileges. Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13799: Lufeng Li of Qihoo 360 Vulcan Team. Entry updated November 10, 2017. Kernel. Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation. Impact: A malicious application may be able to learn information about the presence and operation of other applications on the device. Description: An application was able to access process information maintained by the operating system unrestricted. This issue was addressed through rate limiting. CVE-2017-13852: Xiaokuan Zhang and Yinqian Zhang of The Ohio State University, Xueqiang Wang and XiaoFeng Wang of Indiana University Bloomington, and Xiaolong Bai of Tsinghua University. Entry added November 10, 2017. Messages. Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation. Impact: A person with physical access to an iOS device may be able to access photos from the lock screen. Description: A lock screen issue allowed access to photos via Reply With Message on a locked device. This issue was addressed with improved state management. CVE-2017-13844: Miguel Alvarado of iDeviceHelp INC. Siri. Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation. Impact: A person with physical access to an iOS device may be able to use Siri to read notifications of content that is set not to be displayed at the lock screen. Description: An issue existed with Siri permissions. This was addressed with improved permission checking. CVE-2017-13805: Yiğit Can YILMAZ (@yilmazcanyigit), Ayden Panhuyzen (madebyayden.co) Entry updated June 14, 2018. StreamingZip. Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation. Impact: A malicious zip file may be able modify restricted areas of the file system. Description: A path handling issue was addressed with improved validation. CVE-2017-13804: @qwertyoruiopz at KJC Research Intl. S.R.L. UIKit. Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation. Impact: Characters in a secure text field might be revealed. Description: The characters in a secure text field were revealed during focus change events. This issue was addressed through improved state management. CVE-2017-7113: an anonymous researcher, Duraiamuthan Harikrishnan of Tech Mahindra, Ricardo Sampayo of Bemo Ltd. WebKit. Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation. Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2017-13783: Ivan Fratric of Google Project Zero. CVE-2017-13784: Ivan Fratric of Google Project Zero. CVE-2017-13785: Ivan Fratric of Google Project Zero. CVE-2017-13791: Ivan Fratric of Google Project Zero. CVE-2017-13792: Ivan Fratric of Google Project Zero. CVE-2017-13793: Hanul Choi working with Trend Micro's Zero Day Initiative. CVE-2017-13794: Ivan Fratric of Google Project Zero. CVE-2017-13795: Ivan Fratric of Google Project Zero. CVE-2017-13796: Ivan Fratric of Google Project Zero. CVE-2017-13797: Ivan Fratric of Google Project Zero. CVE-2017-13798: Ivan Fratric of Google Project Zero. CVE-2017-13788: xisigr of Tencent's Xuanwu Lab (tencent.com) CVE-2017-13802: Ivan Fratric of Google Project Zero. CVE-2017-13803: chenqin (陈钦) of Ant-financial Light-Year Security. Entry updated December 21, 2017. Wi-Fi. Available for: iPhone 8, iPhone 8 Plus, and iPhone X. Not impacted: iPhone 7, iPhone 7 Plus, iPhone 6s, iPhone 6s Plus, iPhone 6, iPhone 6 Plus, iPhone SE, iPhone 5s, iPad Air and later, and iPod Touch 6th generation. Impact: An attacker in Wi-Fi range may force nonce reuse in WPA unicast/PTK clients (Key Reinstallation Attacks - KRACK) Description: A logic issue existed in the handling of state transitions. This was addressed with improved state management. CVE-2017-13077: Mathy Vanhoef of the imec-DistriNet group at KU Leuven. CVE-2017-13078: Mathy Vanhoef of the imec-DistriNet group at KU Leuven. Entry updated November 3, 2017. Wi-Fi. Available for: iPhone 7 and later, and iPad Pro 9.7-inch (early 2016) and later. Impact: An attacker in Wi-Fi range may force nonce reuse in WPA multicast/GTK clients (Key Reinstallation Attacks - KRACK) Description: A logic issue existed in the handling of state transitions. This was addressed with improved state management. CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU Leuven. Entry updated November 3, 2017. Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information. Jailbreak software download ios 11.1. Here’s a tutorial on how to jailbreak iOS 11 / 11.1.2 using Electra with Cydia on a computer on 64-bit iPhone, iPad, or iPad touch using this semi-untethered jailbreak solution, developed and released by CoolStar. You may have heard about Electra and want to get your device liberated with it immediately. However, before you dive in, it’s prudent to actually understand what you need to proceed and have yourself prepared. Before proceeding, it’s worth noting that this is a semi-untethered solution, which means that the Electra app will need to be opened and the device re-jailbroken each time it is rebooted or powered down. It’s also worth reiterating that even though Saurik hasn’t updated Cydia or Substrate for iOS 11, Electra final version does come built with it as the developer has himself added support for Cydia. It also comes bundled with the Comex- developed Substitute framework which allows tweaks to be installed as it’s an alternative to Saurik’s Substrate. With all of that in mind, let’s dive right in, and start by checking out the the requirement checklist below: Devices and firmware supported by Electra: This is a jailbreak for iOS 11.0 through to iOS 11.1.2, which means that it only supports 64-bit devices with those firmware versions installed. So, that’s all 64-bit devices including Apple’s latest hardware, iPhone X, and iPhone 8/8 Plus. The excellent and highly versatile Cydia Impactor tool developed and released by Jay Freeman. You can grab it for free from cydiaimpactor.com . The latest version of iTunes. A PC or Mac running Windows or macOS. A free or full developer ID, which can be obtained from developer.apple.com using an existing or new Apple account. And, of course, the latest Electra 1.0.x final IPA file, which can be obtained from our previous coverage here. The process to jailbreak is listed below, and, in all honesty, is relatively simple. Step 1: Make sure that the iOS device in question is connected to the PC or Mac by cable. Before you even attempt to go through the Electra installation process you should be capturing a full backup of that device using the latest version of iTunes. This just protects you and your date in the event that something might go wrong when Electra gets involved. Step 2: Launch the latest version of Cydia Impactor that you have downloaded as part of the requirements above. Drag the latest Electra IPA file onto the Cydia Impactor window and wait for the prompt regarding your Apple ID credentials. Add in the relevant Apple ID email and password to confirm. Once those credentials are accepted, Cydia Impactor does the heavy lifting and sideloads the IPA onto the connected device. NOTE: If Cydia Impactor is entirely new to you then it may be worthwhile checking our detailed guide on how to use it to sideload IPA files, here: Sideload iOS Apps On Windows, Mac With Cydia Impactor Without Jailbreak, Here’s How. Step 3: Now, once the Electra IPA is installed on the device, before it will launch you need to head to S ettings > General > Profile(s) & Device Management and select the profile which has been installed with the Electra app. Select Trust and then Trust again on the resulting alert. You can now head back to the Electra app and tap the icon to launch it. Step 4: Once Electra loads, you will be presented with a fairly standard looking iOS app with a minimal UI and big Jailbreak button in the middle of the screen. Simply tap this button, making sure that the Tweaks toggle is ON.