Comex Releases Source Code for JailbreakMe 3.0
Posted July 19, 2011 at 4:45pm by iClarified
Comex has posted the source code for JailbreakMe 3.0 on his GitHub page.
Codenamed 'saffron' the jailbreak uses a PDF that exploits the font system into installing a custom payload, explains Sogeti.
Two exploits are used to jailbreak Apple devices by opening a PDF file in the MobileSafari browser: initial code execution is obtained through a vulnerability in the Freetype Type 1 font parser, allowing subsequent exploitation of a kernel vulnerability to disable code signing enforcement, get root privileges and "install" the jailbreak. The same kernel vulnerability is also exploited at each reboot to provide an untethered jailbreak, using the Incomplete Codesign technique to bootstrap the kernel exploit
You can check out the code at the link below or click here for a more detailed explanation. To learn how to jailbreak your device click here.
Read More
Codenamed 'saffron' the jailbreak uses a PDF that exploits the font system into installing a custom payload, explains Sogeti.
Two exploits are used to jailbreak Apple devices by opening a PDF file in the MobileSafari browser: initial code execution is obtained through a vulnerability in the Freetype Type 1 font parser, allowing subsequent exploitation of a kernel vulnerability to disable code signing enforcement, get root privileges and "install" the jailbreak. The same kernel vulnerability is also exploited at each reboot to provide an untethered jailbreak, using the Incomplete Codesign technique to bootstrap the kernel exploit
You can check out the code at the link below or click here for a more detailed explanation. To learn how to jailbreak your device click here.
Read More