Hi!

I took a look at the PDF some days ago, looking for the PDF vuln, you
can see my post  about it here:

http://eternal-todo.com/blog/jailbreakme-pdf-exploit

Anyway, I continue analysing it...


Cheers!


Jose Miguel Esparza
http://eternal-todo.com

El 05/08/10 11:13, Ryan Sears escribió:
> Well I'm no expert but I'm going to see if I can reverse engineer the PDFs 
> used for jailbreaking (obviously I'd need an ARM assembly book or someone who 
> knows it :-P) and figure out exactly what they're doing. I agree with was 
> said earlier, I'm not saying they're doing something malicious, but if I 
> wanted to backdoor thousands of phones this is how I'D do it. 
>
> Either way anyone interested in doing the same I've discovered that the 
> webserver (lighthttpd 1.4.19) drops the index if you GET a null byte. 
>
> http://www.jailbreakme.com/%00
>
> *NOTE* Doesn't work in chrome
>
> I'll post if I *do* actually find something interesting, but like I said - 
> I'm no expert on REing PDFs. If anyone has any good tools (I remember there 
> was a PDF analysis framework released a while ago - I just don't remember 
> what it was called) please let me know! 
>
> Also if anyone knows how to get in contact with any of the admins for the 
> site (or anyone who runs it for that matter) please either let me know or let 
> them know. Nobody likes a null byte flaw on thier server - the only reason 
> I'm disclosing this here right now is because as far as I know it only allows 
> indexing of the jailbreak PDFs which could aid the community in verifying 
> there is nothing malicious going on.
>
> When they do patch it (IF they do) I'll be glad to send you all the PDFs if 
> you're intereted in working on them - just email me. 
>
> For now I've put together a one-liner to grab all of them, I'm sure there's a 
> more elegant way to get them, but this works:
> for i in `curl http://www.jailbreakme.com/%00/ | cut -d '=' -f 3 | grep pdf | 
> cut -b 2- | cut -d '"' -f1`; do wget -nv http://www.jailbreakme.com/%00/$i; 
> done
>
> Ryan Sears
> ----- Original Message -----
> From: "Pablo Ximenes" <pa...@ximen.es>
> To: "Marcello Barnaba (void)" <v...@openssl.it>
> Cc: full-disclosure@lists.grok.org.uk
> Sent: Wednesday, August 4, 2010 1:56:47 PM GMT -05:00 US/Canada Eastern
> Subject: Re: [Full-disclosure] On the iPhone PDF and kernel exploit
>
>
> I believe Jailbreakme.com is just REsurfacing,as it used to be used back in 
> the days of the first gen iPhone also for jailbreaking. So, it's not excatly 
> the first time this is happening. 
>
> []'s 
>
> Pablo Ximenes 
> (aka brasuco) 
>
>
> 2010/8/4 Marcello Barnaba (void) < v...@openssl.it > 
>
>
> For the first time in my life, a 0-day exploiting remote code execution, 
> sandbox escaping and privilege escalation has been packaged for general 
> user consumption via a web site ( http://jailbreakme.com ). The actual 
> pdf exploit can be downloaded here: http://jailbreakme.com/_/ . 
>
> What puzzles me is.. no notices here on FD, no info on Bugtraq, no CVE, 
> no press release by the CERT, as of now. 
>
> The cat & mouse game played by the iPhone dev team and Apple is done to 
> liberate our devices from useless restrictions, but the whole point for 
> them to exist is because said devices live in a walled garden, that is 
> really useful only to the company behind it. 
>
> I've posted more thougths and the few technical details I was able to 
> gather (from a tweet!) here: 
>
> http://sindro.me/2010/8/4/on-the-iphone-pdf-and-kernel-exploit 
>
> What do you think? Did someone reverse engineer the exploit? 
>
> ~Marcello 

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to