938
VMScore

CVE-2016-4656

Published: 25/08/2016 Updated: 08/06/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 938
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The kernel in Apple iOS prior to 9.3.5 allows malicious users to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple iphone os

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ManualRanking include Msf::Exploit::Remote::HttpServer::HTML def initialize(info = {}) super(update_info(info, 'Name' => 'We ...

Github Repositories

Added support for different phones

Trident This exploits the following two CVEs: CVE-2016-4655: allow an attacker to obtain sensitive information from kernel memory via a crafted app CVE-2016-4656: allow an attacker to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app CVE-2016-4657 (WebKit exploit) is NOT included despite the name of the project b

open source "untether" for 32bit 8.4.1-9.1 untethered jailbreak. codesign bypass & kernel exploit

daibutsu 70-91 untether only (for 32/64 bit iOS) 841 Jailbreak for 32 bits 警告 日本国内において、及び日本国内向けに悪用することを禁じます。 exploit A dyld exploit that overrides the MISValidateSignature in libmisdylib (CVE-2015-7079) OSUnserialize kernel Infoleak(CVE-2016-4655) pegasus kernel exploit (CVE-2016-4656) dyld Change dyld_shar

open source "untether" for 32bit 8.4.1-9.1 untethered jailbreak. codesign bypass & kernel exploit

daibutsu 70-91 untether only (for 32/64 bit iOS) 841 Jailbreak for 32 bits 警告 日本国内において、及び日本国内向けに悪用することを禁じます。 exploit A dyld exploit that overrides the MISValidateSignature in libmisdylib (CVE-2015-7079) OSUnserialize kernel Infoleak(CVE-2016-4655) pegasus kernel exploit (CVE-2016-4656) dyld Change dyld_shar

8.4.1 Jailbreak using CVE-2016-4655 / CVE-2016-4656

skybreak 841 Jailbreak using CVE-2016-4655 / CVE-2016-4656 Credit: Bellis1000 (Billy Ellis), jndok

OS X 10.11.6 LPE PoC for CVE-2016-4655 / CVE-2016-4656

PegasusX OS X 10116 LPE PoC for CVE-2016-4655 / CVE-2016-4656 CVEs Analysis & Writeup A detailed analysis of the CVEs used in this PoC is available here: Analysis and exploitation of Pegasus kernel vulnerabilities (CVE-2016-4655 / CVE-2016-4656)

Trident THIS VERSION WAS MADE AND COMPILED BY /u/mehulrao This exploits the following two CVEs: CVE-2016-4655: allow an attacker to obtain sensitive information from kernel memory via a crafted app CVE-2016-4656: allow an attacker to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app CVE-2016-4657 (WebKit exploit)

32-bit exploit for iOS <9.3.5

Trident This exploits the following two CVEs: CVE-2016-4655: allow an attacker to obtain sensitive information from kernel memory via a crafted app CVE-2016-4656: allow an attacker to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app CVE-2016-4657 (WebKit exploit) is NOT included despite the name of the project b

NOT WORKING AT THE MOMENT

Trident This exploits the following two CVEs: CVE-2016-4655: allow an attacker to obtain sensitive information from kernel memory via a crafted app CVE-2016-4656: allow an attacker to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app CVE-2016-4657 (WebKit exploit) is NOT included despite the name of the project b

Trident Exploitation of: CVE-2016-4655: allow an attacker to obtain sensitive information from kernel memory via a crafted app CVE-2016-4656: allow an attacker to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app CVE-2016-4657 (WebKit exploit) is NOT included even if the project is called Trident, it is only abou

My first iOS 'jailbreak' , using CVE 2016-4655 & CVE 2016-4656

br0ke My first iOS 'jailbreak' , using CVE 2016-4655 &amp; CVE 2016-4656 For now only iPad2,7 on iOS 91 is supported(fixed offsets) I added some comments for helping beginners(like me) to understand the code easier

Trident Exploitation of: CVE-2016-4655: allow an attacker to obtain sensitive information from kernel memory via a crafted app CVE-2016-4656: allow an attacker to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app CVE-2016-4657 (WebKit exploit) is NOT included even if the project is called Trident, it is only abou