The day before yesterday Pod2g told his followers about the status of iOS 5.1 jailbreak. He tweeted that he has collected all the exploits required to jailbreak iOS 5.1 untethered on idevices and that he was working then to bypass the ASLR security layer on iPhone 4S, iPhone 4, new iPad 3 and other devices. Today he gives another update through his twitter account that he has almost achieved the method to bypass ASLR mechanism.
If you don’t know about ASLR here is how it is defined on Wikipedia:
Address space layout randomization (ASLR) is a computer security method which involves randomly arranging the positions of key data areas, usually including the base of the executable and position of libraries, heap, and stack, in a process’s address space.
Address space randomization hinders some types of security attacks by making it more difficult for an attacker to predict target addresses. For example, attackers trying to execute return-to-libc attacks must locate the code to be executed, while other attackers trying to execute shellcode injected on the stack have to find the stack first. In both cases, the related memory addresses are obscured from the attackers. These values have to be guessed, and a mistaken guess is not usually recoverable due to the application crashing.
It seems we are getting closer and closer to the final and public release of jailbreak for iOS 5.1 firmware version released by Apple last month. We, at shoutpedia, will keep you updated on the latest from iPhone and Chronic Dev Teams. We will also post here the complete step by step methods of iOS 5.1 jailbreak when it is out.
If you don’t want to miss the updates, you should follow us on Twitter/Google+ or like our Facebook page.