Jump to content

evasi0n

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by X686 (talk | contribs) at 03:41, 23 December 2013. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

evasi0n
Developer(s)evad3rs (pod2g, MuscleNerd, planetbeing, pimskeks)
Stable release
1.5.3
Operating systemMicrosoft Windows, OS X and Linux
Websiteevasi0n.com

evasi0n (spelled with a zero) is a jailbreak known for a portable code base and minimal use of arbitrary code execution. It is currently capable of jailbreaking iOS devices running versions between 7.0 to 7.0.4.

More than seven million copies were downloaded and presumably installed in the first four days after release.[1] It was released on Feb. 4th, 2013. Four of the six exploits used were not patched by Apple until March 18, 2013. This meant the end of evasi0n. On December 21, 2013, the evad3rs released a new version of Evasi0n that support jailbreaking iOS 7.x.

The evasi0n jailbreak specifically breaches modern security features such as address space layout randomization for kernel space and a version of launchd with a hard-coded list of exclusive services, which serve device stability as well as vendor lock-in on iOS - where evasi0n reads fixed data vectors to locate the random address of the kernel space and utilizes the /etc/launchd.conf file which launchd processes regardless of the list of exclusive services.[2]


References

  1. ^ "Evasi0n 'jailbreaks' 7M iOS devices, update already available for iOS 6.1.1". Apple Insider. 12 Feb 2013. Retrieved 13 Feb 2013.
  2. ^ Greenberg, Andy. "Inside Evasi0n, The Most Elaborate Jailbreak To Ever Hack Your iPhone". Retrieved 23 December 2013.