We’ve some bad news for jailbreakers. David Wang aka planetbeing has revealed that iOS 6.1.3 beta 2 that was seeded to developers last week, fixes a vulnerability that was used by evad3rs dev team for the evasi0n jailbreak.
This means that evasi0n jailbreak won’t work on iOS devices running iOS 6.1.3.
Forbes’ Andy Greenberg who spoke to planetbeing reports:
Wang tells me that he’s analyzed the 6.1.3 beta 2 update and found that it patches at least one of the five bugs the jailbreak exploits, namely a flaw in the operating system’s time zone settings. The beta update likely signals the end of using evasi0n to hack new or updated devices after the update is released to users, says Wang, who says he’s still testing the patch to see which other vulnerabilities exploited by the jailbreak might no longer exist in the new operating system.
“If one of the vulnerabilities doesn’t work, evasi0n doesn’t work,” he says. “We could replace that part with a different vulnerability, but [Apple] will probably fix most if not all of the bugs we’ve used when 6.1.3 comes out.”
Since evasi0n didn’t use a userland exploit like JailbreakMe, I assumed that Apple wouldn’t fix the vulnerabilities used by evad3rs dev team until iOS 7. However, it looks like the popularity of the evasi0n jailbreak, which has already been used to jailbreak more than seven million devices in just four days and concerns raised by security researchers may have forced Apple to fix the vulnerabilities.
Security researchers have nonetheless pointed out that Evasi0n could give criminals or spies some nasty ideas. The tool uses five distinct bugs in iOS, all of which might be appropriated and combined with other techniques for malicious ends. And F-Secure researcher Mikko Hypponen points out that if a hacker used a Mac or Windows exploit to compromise a user’s PC, he or she could simply wait for the target to plug in an iPhone or iPad and use evasi0n to take over that device as well.
More likely, perhaps, is a scenario described by German iPhone security researcher Stefan Esser. He argues that a hacker could use a secret exploit to gain access to an iPhone or iPad and then install evasi0n, using the jailbreaking tool to hide his or her tracks and keep the secret exploit technique undiscovered by Apple and unpatched. “That way they protect their investment and leave no exploit code that could be analyzed for origin,” Esser wrote on Twitter.
It remains to be seen how many vulnerabilities will be fixed by the time iOS 6.1.3 is released to the public. It goes without saying that jailbreakers should avoid upgrading to iOS 6.1.3 when it is released and probably a good time to jailbreak your iOS device if you haven’t done so already (You can find the links to our step-by-step jailbreak tutorials here).
iOS 6.1.3 includes major improvements for Maps app for Japan and a fix for the passcode security flaw, so I’m assuming the temptation to update to iOS 6.1.3 won’t be too high.
But let’s hope that the evad3rs can work their magic and figure out a way to jailbreak iOS 6.1.3.
Some more bad news, security researcher Stefan Esser has just tweeted that in addition to the timezone vulnerability, Apple has fixed another vulnerability that was used for evasi0n jailbreak:
So iOS 6.1.3 beta 2 also fixes the overlapping segment attack against dyld used in evasi0n
— Stefan Esser (@i0n1c) February 25, 2013