Free Republic
Browse · Search
Smoky Backroom
Topics · Post Article

To: PugetSoundSoldier
Sorry, you're wrong. Now the question is: will you admit it?

Puget, First of all, as I stated in the previous post, iOS devices do not have Non-Execute stacks and ARE vulnerable to data buffer overflow exploits. And yes, the iPhone was being ROOTED by a visit to a website and the downloading of a PDF file.

However, that vulnerability was closed with iOS 4.0.2 and iOS 3.2.2 four weeks ago... so talk about something up-to-date... and relevant to today. And even more so with the release of iOS 4.1

So, no, Puget, I am not wrong. This particular Adobe PDF vulnerability and FLASH flaw is NOT impacting iOS devices and no exploits are being reported. This flaw is in the Adobe READER and the Adobe Flash Player... not in the Apple written reader built into the iPhone, iPod, and iPad that was exploited in the Jailbreakme.com exploit... that vulnerability is gone. This is a totally different vulnerability and it simply DOES NOT EXIST on these devices because, Puget, these applications DO NOT EXIST for iOS. Can I make it any easier for you to understand than that? Whether there might be more buffer overflow vulnerabilities is not in question here... there may be. What is in question is DOES THIS VULNERABILITY, discovered last week, impact these devices. The answer is NO, it does not.

So you are wrong. Now the question is: Will you admit it?

176 posted on 09/15/2010 7:10:05 PM PDT by Swordmaker (This tag line is a Microsoft product "insult" free zone!)
[ Post Reply | Private Reply | To 171 | View Replies ]


To: Swordmaker
Puget, First of all, as I stated in the previous post, iOS devices do not have Non-Execute stacks and ARE vulnerable to data buffer overflow exploits. And yes, the iPhone was being ROOTED by a visit to a website and the downloading of a PDF file.

Yet you stated, unequivocally and without restriction:

In the case of OSX and iOS, PDFs are usually read by native, non-Adobe, routines built into the OS... so they are not at risk either...

Sorry, the jailbreakme.com (and in fact, the new jailbreaking of the iPhone 4) site relied on on ACEs. They exist and are exploited every day by the thousands.

That you continue to deny this is simply amazing...

So you are wrong. Now the question is: Will you admit it?

iOS has been - and is being - cracked by simple ACE exploits daily. Bone-stock iOS loads are cracked - jailbroken - by using arbitrary code execution exploits. Your constant lies to the contrary notwithstanding! ACEs are how you jailbreak a phone, but that goes against your "all-things-Apple-are-invulnerable" approach, so of course you cannot admit it.

Continue in your lying ways, Sword!

178 posted on 09/15/2010 7:40:02 PM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 176 | View Replies ]

Free Republic
Browse · Search
Smoky Backroom
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson