JailbreakMe
{{short description|Series of iOS jailbreaks}}
{{Infobox software
|name = JailbreakMe
|screenshot = JailbreakMe screenshot.png
|caption = JailbreakMe 2.0
|developer = {{plainlist|
- 2.0–3.0: comex, Grant Paul (chpwn), Jay Freeman (saurik), MuscleNerd, et al.
- 4.0: tihmstar
- TotallyNotSpyware: JakeBlair420 team
}}
|latest release version = TotallyNotSpyware
|latest release date = {{start date and age|2018|09|07}}
|operating system = iOS
|genre = iOS jailbreaking
|license = Freeware
|website = {{URL|jailbreakme.com}}
}}
JailbreakMe is a series of jailbreaks for Apple's iOS mobile operating system that took advantage of flaws in the Safari browser on the device,{{cite web |url=https://www.pcworld.com/article/202436/jailbreakme_exploits_serious_iphone_security_flaw.html |title=JailbreakMe Exploits Serious iPhone Security Flaw |last=Bradley |first=Tony |date=August 3, 2010 |work=Net Work |publisher=PCWorld Communications, Inc. |accessdate=October 15, 2010}} providing an immediate one-step jailbreak, unlike more common jailbreaks, such as Blackra1n and redsn0w, that require plugging the device into a computer and running the jailbreaking software from the desktop. JailbreakMe included Cydia, a package management interface that serves as an alternative to the App Store. Although it does not support modern devices, the websites remain available for compatible devices.
JailbreakMe's first version in 2007 worked on iPhone and iPod Touch firmware 1.1.1, the second version was released in August 2010 for firmware 4.0.1 and earlier, and the third and final version was released in July 2011 for iOS versions 4.3 to 4.3.3 (and was the first jailbreak for the iPad 2). JailbreakMe 3.0 has been used to jailbreak at least two million devices.{{cite web |url=https://blogs.forbes.com/andygreenberg/2011/08/01/meet-comex-the-iphone-uber-hacker-who-keeps-outsmarting-apple/ |title=Meet Comex, The 19-Year-Old iPhone Uber-Hacker Who Keeps Outsmarting Apple |last=Greenberg |first=Andy |date=August 1, 2011 |work=The Firewall |publisher=Forbes |accessdate=August 2, 2011}}
Versions
= JailbreakMe 1.0 (iOS 1.1.1) =
JailbreakMe, released on October 28, 2007, was originally used to jailbreak the iPhone and iPod Touch running the 1.1.1 version of iOS, then named iPhone OS.{{Cite web |last=Krazit |first=Tom |date=October 31, 2007 |title=More than 100,000 iPhone owners break out of jail |url=https://www.cnet.com/tech/tech-industry/more-than-100000-iphone-owners-break-out-of-jail/ |access-date=August 13, 2024 |website=CNET |language=en}} Using a TIFF exploit against Safari, it installed Installer.app.{{cite web |url=http://reviews.cnet.com/8301-19512_7-10115225-233.html |title=One-step method for adding third-party apps to iPhone 1.1.1, iPod Touch debuts |date=October 29, 2007 |publisher=CNET |last=Wilson |first=Ben |accessdate=August 25, 2011 |archive-url=https://web.archive.org/web/20120313082839/http://reviews.cnet.com/8301-19512_7-10115225-233.html |archive-date=March 13, 2012 |url-status=dead }} The vulnerability used in this exploit was patched by Apple in the 1.1.2 firmware.
This tool, also called "AppSnapp", was created by a group of nine developers, and hosted by Conceited Software.{{cite web |url=http://www.pcworld.com/article/139061/hacker_software_can_install_unauthorized_software_on_iphones.html |title=Hacker Software Can Install Unauthorized Software on iPhones |date=October 29, 2007 |last=Keizer |first=Gregg |publisher=PCWorld |accessdate=August 25, 2011 |archive-date=September 25, 2011 |archive-url=https://web.archive.org/web/20110925173658/http://www.pcworld.com/article/139061/hacker_software_can_install_unauthorized_software_on_iphones.html |url-status=dead }} The team estimated that 100,000 devices were jailbroken in the first three days of its release, growing past 1 million in the first month.{{Cite book |last=Zdziarski |first=Jonathan A. |url=https://www.worldcat.org/title/192027459 |title=iPhone open application development |date=2008 |publisher=O'Reilly |isbn=978-0-596-51855-4 |edition=1st |location=Beijing; Sebastopol, CA |pages=v |oclc=192027459}}
= JailbreakMe 2.0 (iOS 3.1.2–4.0.1) =
JailbreakMe 2.0 "Star", released by comex on August 1, 2010, exploited a vulnerability in the FreeType library used while rendering PDF files. This was the first publicly available jailbreak for the iPhone 4, able to jailbreak iOS 3.1.2 through 4.0.1 on the iPhone, iPod Touch, and iPad models then current.{{cite web|url=https://www.engadget.com/2010/08/01/official-iphone-4-jailbreak-hits-from-iphone-dev-team/ |title=Official: iPhone 4 jailbreak hits from iPhone Dev Team (updated with video) |publisher=Engadget |date=August 1, 2010 |last=Hollister |first=Sean |accessdate=September 11, 2010}} This jailbreak was activated by visiting the jailbreakme.com web page on the device's Safari web browser.
The vulnerability used by JailbreakMe 2.0 was patched by Apple in iOS 4.0.2 for iPhone and iPod Touch, and iOS 3.2.2 for iPad.{{cite web |url=https://www.engadget.com/2010/08/11/apple-releases-ios-4-0-2-for-iphone-and-3-2-2-for-ipad-fixes-pd/ |title=Apple releases iOS 4.0.2 for iPhone and 3.2.2 for iPad, fixes PDF vulnerability |publisher=Engadget |last=Patel |first=Nilay |date=August 11, 2010 |accessdate=2010-09-11}}
= JailbreakMe 3.0 (iOS 4.3–4.3.3) =
JailbreakMe 3.0 "Saffron", released on July 6, 2011, will jailbreak most iOS devices on iOS 4.3-4.3.3 and iPad 2 on 4.3.3.{{cite web |url=http://blog.iphone-dev.org/post/7295551750/jailbreakme-times-3 |title=jailbreakme times 3 |date=July 6, 2011 |publisher=iPhone Dev Team Blog |author=iPhone Dev Team |accessdate=August 2, 2011 |archive-date=July 7, 2011 |archive-url=https://web.archive.org/web/20110707133640/http://blog.iphone-dev.org/post/7295551750/jailbreakme-times-3 |url-status=dead }} It was the first publicly available jailbreak for iPad 2. JailbreakMe 3.0 exploited a FreeType parser security flaw (similar to JailbreakMe 2.0), using the form of a PDF file rendered by Mobile Safari, which then used a kernel vulnerability to complete the untethered jailbreak.{{cite web |url=http://labs.eweek.com/archives/apple-fixes-latest-ios-exploit |title=Apple Fixes Latest iOS Exploit |last=Connolly |first=P. J. |date=July 15, 2011 |work=eWEEK Labs |publisher=eWEEK |accessdate=October 23, 2011}}{{cite web|url=http://esec-lab.sogeti.com/post/Analysis-of-the-jailbreakme-v3-font-exploit |title=Analysis of the jailbreakme v3 font exploit |author=jean |date=July 18, 2011 |publisher=Sogeti ESEC Lab |accessdate=October 23, 2011 |url-status=dead |archiveurl=https://web.archive.org/web/20110722135644/http://esec-lab.sogeti.com/post/Analysis-of-the-jailbreakme-v3-font-exploit |archivedate=July 22, 2011 }} Comex also released a patch for this FreeType flaw, named PDF Patcher 2, which is available as a free package installable via Cydia.{{cite news|title=Apple iOS Zero-Day PDF Vulnerability Exposed |last=Schwartz |first=Mathew J. |url=http://www.informationweek.com/news/231001147 |newspaper=InformationWeek |date=July 7, 2011 |accessdate=October 23, 2011 |url-status=dead |archiveurl=https://web.archive.org/web/20110710123801/http://www.informationweek.com/news/231001147 |archivedate=July 10, 2011 }}
A few days before the initial release, a beta tester leaked JailbreakMe 3.0 to the public. Comex said on Twitter that this put him on a "time limit" to release the final version quickly.
The JailbreakMe website looked similar to downloading an App Store app. It included a blue button indicating "FREE", which changed into a green "INSTALL" button when pressed once, much like an application on the App Store. After tapping "INSTALL", Safari would close, Cydia would load as a new app, and the device would be jailbroken with no reboot necessary.
On July 15, 2011, Apple released iOS 4.3.4 (GSM) and 4.2.9 (CDMA) to patch the flaws used by JailbreakMe.{{cite web |url=http://www.pcworld.com/article/235836/ios_434_is_out_fixes_jailbreakme_30_exploit.html |title=iOS 4.3.4 Is Out; Fixes JailbreakMe 3.0 Exploit |last=Mediati |first=Nick |date=July 15, 2011 |work=Geek Tech |publisher=PCWorld |accessdate=October 23, 2011 |archive-date=April 13, 2012 |archive-url=https://web.archive.org/web/20120413110232/http://www.pcworld.com/article/235836/ios_434_is_out_fixes_jailbreakme_30_exploit.html |url-status=dead }}
Comex received a Pwnie Award at the Black Hat Conference in 2011 for "Best Client-Side Bug" for this work.{{cite web |url=http://www.informationweek.com/news/security/attacks/231300255 |title=Pwnie Award Highlights: Sony Epic Fail And More |date=August 4, 2011 |last=Schwartz |first=Mathew J. |publisher=InformationWeek |accessdate=August 25, 2011}}
Comex was hired by Apple as an intern in August of 2011.{{cite web |url=https://www.forbes.com/sites/andygreenberg/2011/08/26/apple-hacker-extraordinaire-comex-takes-an-internship-at-apple/ |title=Apple Hacker Extraordinaire Comex Takes An Internship At Apple |last=Greenberg |first=Andy |date=August 26, 2011 |work=Forbes |accessdate=November 2, 2011 }}
=JailbreakMe 4.0 (iOS 9.1–9.3.4) =
JailbreakMe 4.0, released by tihmstar on December 12, 2017, exploited three serious vulnerabilities ({{CVE|2016-4655|2016-4656|2016-4657|leadout=and}}), already utilized by the spyware Pegasus. It was mainly based on HomeDepot, a semi-untethered jailbreak released by jk9357. HomeDepot targeted all 32-bit devices between iOS 9.1 and iOS 9.3.4.
The vulnerabilities used by HomeDepot and JailbreakMe 4.0 were patched by Apple in iOS 9.3.5.
The jailbreak was hosted by Corellium founder Chris Wade at [https://jailbreak.me/ jailbreak.me]. Whilst technically semi-untethered, the jailbreak could be made fully untethered with the use of tihmstar's UntetherHomeDepot package.
=TotallyNotSpyware (iOS 10)=
TotallyNotSpyware, created by the JakeBlair420 team, released on September 7, 2018, is a JailbreakMe-style exploit that works on any 64-bit device running iOS 10. As with JailbreakMe 4.0, the web browser is induced to sideload Cydia using a payload, either Meridian or doubleH3lix. It is hosted at [https://totally-not.spyware.lol/ totally-not.spyware.lol], and is semi-untethered.
Domain name transfer
On October 7, 2011, Conceited Apps, which had been allowing Comex to use the domain name for hosting, sold the domain name jailbreakme.com to an allegedly "unknown" party. SaurikIT acquired the domain the next day.{{cite web |url=http://www.redmondpie.com/jailbreaks-me-is-the-new-url-for-ipad-2-jailbreak-stay-away-from-jailbreakme-com-as-it-may-distribute-malware-under-new-ownership/ |title=Jailbreaks.me Is The New URL For iPad 2 Jailbreak; Stay Away From JailbreakMe.com As It May Distribute Malware Under New Ownership |author=Waisybabu |date=October 7, 2011 |publisher=Redmond Pie |accessdate=October 23, 2011 }}{{cite web| url=http://www.redmondpie.com/jailbreakme.com-bought-back-by-saurik-community-collectively-heaves-sigh-of-relief/| title=JailbreakMe.com Bought Back By Saurik, Community Collectively Heaves Sigh Of Relief| publisher=Redmond Pie |author=Waisybabu |date=October 8, 2011| accessdate=October 8, 2011}}
=Domain redirection=
[https://web.archive.org/web/20191110230440/https://jailbreakme.com/ jailbreakme.com] would redirect to [https://cydia.saurik.com/ cydia.saurik.com] if an incompatible device was detected.
Later, it redirects to [https://totally-not.spyware.lol/ totally-not.spyware.lol]
Compatible iOS versions
{{missing information|section|JailbreakMe 4.0 and TotallyNotSpyware|date=July 2019}}
class="wikitable sortable" |
scope="col" style="width:200px;"| Device
! iOS versions vulnerable to JailbreakMe |
---|
iPhone (1st generation)
| 1.1.1, 3.1.2 to 3.1.3 |
iPhone 3G
| 3.1.2 to 4.0.1 |
iPhone 3GS
| 3.1.2 to 4.0.1, 4.3 to 4.3.3 |
iPhone 4 (GSM)
| 4.0 to 4.0.1, 4.3 to 4.3.3 |
iPhone 4 (CDMA)
| 4.2.6 to 4.2.8 |
iPhone 4S and later
| None |
iPod Touch (1st generation)
| 1.1.1, 3.1.2 to 3.1.3 |
iPod Touch (2nd generation)
| 3.1.2 to 4.0.1 |
iPod Touch (3rd generation)
| 3.1.2 to 4.0.1, 4.3 to 4.3.3 |
iPod Touch (4th generation)
| 4.3 to 4.3.3 |
iPod Touch (5th generation) and later
| None |
iPad (1st generation)
| 3.2 to 3.2.1, 4.3 to 4.3.3 |
iPad 2
| 4.3.3 |
iPad (3rd generation) and later
| 9.1 to 9.3.4 |
iPad Mini (all models)
| None |
References
{{Reflist}}
External links
- {{official website}}
{{iOS}}