Comex Released JailbreakMe 3.0 Source Code . As Promissed, iOS Hacker Comex has released the Source Code of his PDF Exploit JailbreakMe 3.0 (Jailbreak Tool). Actually, this Source Code is capable to look through it and understand how JailbreakMe cass it spell on unassuming iOS Devices.
Codenamed ‘saffron’ the jailbreak uses a PDF that exploits the font system into installing a custom payload, explains Sogeti.
Two exploits are used to jailbreak Apple devices by opening a PDF file in the MobileSafari browser: initial code execution is obtained through a vulnerability in the Freetype Type 1 font parser, allowing subsequent exploitation of a kernel vulnerability to disable code signing enforcement, get root privileges and “install” the jailbreak. The same kernel vulnerability is also exploited at each reboot to provide an untethered jailbreak, using the Incomplete Codesign technique to bootstrap the kernel exploit.
Actually, this Hacker Comex is an well known among the iPhone/iPad Jailbreaking Community, specially known as the iPad 2 Jailbreak “JailbreakMe” series of Jailbreaking Tools. While the first JailbreakMe worked on iOS 1.1.1 for iPhone and iPod Touch, and the second worked on iOS 4.0.1 on all iOS Devices and now+ the third version called JailbreakMe 3.0 w+as released a couple of weeks ago.
JailbreakMe Star Back Source Code was released by Comex in August and then he promised to release the Saffron Source Code. While this Code allows other Jailbreak Hackers to go through Comex Code and Can create their own Tools easily. Grab this JailbreakMe 3.0 Source Code from HERE .