Just thought I'd share. I am currently jailbroken on 4.2.1 (long story to why I was forced to do so), and when I reboot the phone, it DOES NOT boot. It just hangs at the apple splash screen. I have to use redsn0w to boot. I did notice that when I first jailbroke it on 4.2.1, I was able to reboot it completely, but cydia wouldn't open. According to Russ Cox Kernel exploit support list, it will work on iPhone 5S and later, iPad Air and later, iPod touch 6 devices running iOS 11.2, iOS 11.2.1 & iOS 11.2.2. Therefore, some jailbreak experts advise you to get ready for iOS 11.2 to iOS 11.2.2 jailbreak.
About Apple security updates
May 12, 2020 If you are on a newer Mac and no longer have iTunes, you can update your iPhone through Finder. If your device is not jailbroken, then you will update to iOS 13 without any problems. Unfortunately however, GreenPois0n has not been maintained past iOS 4.2.1/4.2.6 because it was replaced by the Absinthe Jailbreaking tool. If your iOS device is still running one of its supported firmwares however, it is a great tool to use. Latest GreenPois0n Untethered Jailbreak: iOS 4.2.1. GreenPois0n iPhone Support. IPhone 6s Plus: Not. Formally bringing the jailbreak tool up to variant 5.2.1. The update was declare by means of the unc0ver Group’s legitimate Twitter account early Wednesday morning. And from what we can assemble. It generally gives off an impression of being a bug fix update.From what we can accumulate, unc0ver v5.2.1 is includes the progressions sketch out.
For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.
For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key.
Apple security documents reference vulnerabilities by CVE-ID when possible.
iOS 10.2.1
Released January 23, 2017
APNs Server
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: An attacker in a privileged network position can track a user's activity
Description: A client certificate was sent in plaintext. This issue was addressed through improved certificate handling.
CVE-2017-2383: Matthias Wachs and Quirin Scheitle of Technical University Munich (TUM)
Entry added March 28, 2017
Call History
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Half life 2 4k. Impact: Updates for CallKit call history are sent to iCloud
Description: An issue existed in preventing the uploading of CallKit call history to iCloud. This issue was addressed through improved logic.
CVE-2017-2375: Elcomsoft
Entry added February 21, 2017
Contacts
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: Processing a maliciously crafted contact card may lead to unexpected application termination
Description: An input validation issue existed in the parsing of contact cards. This issue was addressed through improved input validation.
CVE-2017-2368: Vincent Desmurs (vincedes3)
Kernel Midi files cinderella.
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: An application may be able to execute arbitrary code with kernel privileges
Description: A buffer overflow issue was addressed through improved memory handling.
CVE-2017-2370: Ian Beer of Google Project Zero
Kernel
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: An application may be able to execute arbitrary code with kernel privileges Solved copy dimension style between drawings in autocad for mac.
Description: A use after free issue was addressed through improved memory management.
CVE-2017-2360: Ian Beer of Google Project Zero
libarchive
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution
Description: A buffer overflow issue was addressed through improved memory handling.
CVE-2016-8687: Agostino Sarubbo of Gentoo
Unlock with iPhone
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: Apple Watch may unlock when off the user’s wrist
Description: A logic issue was addressed through improved state management.
CVE-2017-2352: Ashley Fernandez of raptAware Pty Ltd
Entry updated January 25, 2017
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: Processing maliciously crafted web content may exfiltrate data cross-origin
Description: A prototype access issue was addressed through improved exception handling.
CVE-2017-2350: Gareth Heyes of Portswigger Web Security
Netcut apk. WebKit
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: Processing maliciously crafted web content may lead to arbitrary code execution
Description: Multiple memory corruption issues were addressed through improved memory handling.
CVE-2017-2354: Neymar of Tencent's Xuanwu Lab (tencent.com) working with Trend Micro's Zero Day Initiative
CVE-2017-2362: Ivan Fratric of Google Project Zero
CVE-2017-2373: Ivan Fratric of Google Project Zero
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: Processing maliciously crafted web content may lead to arbitrary code execution
Description: A memory initialization issue was addressed through improved memory handling.
CVE-2017-2355: Team Pangu and lokihardt at PwnFest 2016
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: Processing maliciously crafted web content may lead to arbitrary code execution
Description: Multiple memory corruption issues were addressed through improved input validation.
CVE-2017-2356: Team Pangu and lokihardt at PwnFest 2016
CVE-2017-2369: Ivan Fratric of Google Project Zero
CVE-2017-2366: Kai Kang of Tencent's Xuanwu Lab (tencent.com)
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: Processing maliciously crafted web content may exfiltrate data cross-origin
Description: A validation issue existed in the handling of page loading. This issue was addressed through improved logic.
CVE-2017-2363: lokihardt of Google Project Zero
CVE-2017-2364: lokihardt of Google Project Zero
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: A malicious website can open popups
Description: An issue existed in the handling of blocking popups. This was addressed through improved input validation.
CVE-2017-2371: lokihardt of Google Project Zero
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: Processing maliciously crafted web content may exfiltrate data cross-origin
Description: A validation issue existed in the handling of variable handling. This issue was addressed through improved validation.
CVE-2017-2365: lokihardt of Google Project Zero
Wi-Fi
Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later
Impact: An activation-locked device can be manipulated to briefly present the home screen
Description: An issue existed with handling user input that caused a device to present the home screen even when activation locked. This was addressed through improved input validation.
CVE-2017-2351: Hemanth Joseph, Sriram (@Sri_Hxor) of Primefort Pvt. Ltd., Mohamd Imran
Entry updated February 21, 2017
Additional recognition
WebKit hardening
We would like to acknowledge Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Bos, and Cristiano Giuffrida of the vusec group at Vrije Universiteit Amsterdam for their assistance.
As promised, iPhone Dev team announced Redsn0w 0.9.7b1 untethered jailbreak for iOS 4.2.1. Redsn0w 0.9.7b1 jailbreak is designed to work with iPhone 4, iPod Touch 4G and Apple iPad. Those who are using iPhone 3G, iPhone 3G S, iPod Touch 2G on iOS 4.2.1 already have a fully working untethered jailbreak with Redsn0w 0.9.6b6. As you might know, an untethered jailbreak let you restart your device to jailbreak mode, without the need of connecting the device to a computer. Redsn0w 0.9. 7b1 download released today is intended for Mac users who are interested in helping the dev team in testing the jailbreak for any bugs.
These are the requirements for running Redsn0w 0.9.7b1.
An Apple iPhone 4, iPod Touch 4G or iPad with iOS 4.2.1 installed.
iOS 4.2.1 ipsw (direct link here).
A developer account with Apple for getting iOS 4.2.1 beta 3.
You need your Signature Hash files saved (on Cydia server) for iOS 4.2.1 beta 3.
Mac OS X.
Steps for iOS 4.2.1 untethered jailbreak with Redsn0w 0.9.7b1.
Jailbreak your iPhone 4, iPad or iPod Touch 4G with Redsn0w 0.9.6 b4 for Mac.
Now Open Cydia and check whether you have Signature Hash files for iOS 4.2b3 saved on Cydia server. If so, proceed to the next step.
Download Redsn0w 0.9.7b1 here
Download usbmuxd.
Extract usbmuxd file, and start Mac OS X Terminal app from Applications> Utilities folder.
Now point the Terminal app to the python-client directory in usbmuxd folder and enter the commands in each line.
chmod +x tcprelay.py
./tcprelay.py -t 22:2222
./tcprelay.py -t 22:2222
Usbmuxd will make the Apple USB cable work with the jailbreak application. Make sure that you enter the commands exactly as shown above.
Run Redsn0w 0.9.7b1 and point it to the official iOS 4.2.1 firmware file.
Click next, select Jailbreak Monte option and browse to the downloaded iOS 4.2.1 beta 3.
Redsn0w 0.9.7b1 will now process jailbreak and in the next step choose the option Jailbreak Monte (untether).
Now enter into the DFU mode by following the on screen instructions.
Redsn0w 0.9.7b1 will complete the jailbreak process and will start your device in the untethered mode.
This version of Redsn0w is a little unstable, and therefore, some device options may stop working after jailbreak. So normal users and those who rely on the Ultrasn0w unlock are not advised to use this jailbreak. Redsn0w 0.9.7b2 or the upcoming versions of the tool would be able to process the untethered jailbreak with locally saved Signature Hash files and without usbmuxd. 2wire 802.11 g usb wireless adapter driver windows 10.
![Jailbreak Jailbreak](https://i.ytimg.com/vi/PM_XfMhUeFc/maxresdefault.jpg)
Update: Download Redsn0w 0.9.7b3 here. (Install Redsn0w 0.9.7b3 after a fresh restore with iOS 4.2.1)
Iphone 2.1 Jailbreak For Mac Pro
Bugs fixed: Native app crashes with Redsn0w 0.9.7b2, Issues with embedded videos and FaceTime with Redsn0w 0.9.7b3.
Update: Download Redsn0w 0.9.7b4 here. Now you don’t need to use usbmuxd and any related command part for jailbreaking. Just follow the other steps given in the tutorial and finally use Redsn0w 0.9.7b4 for untethered jailbreak.
Update: Download Redsn0w 0.9.7b5 here. Bluetooth issues are now fixed.
Iphone 2.1 Jailbreak For Mac Download
Update: Download Redsn0w 0.9.7b6 here. Issues with Skype fixed.