The very first jailbreak was from a similar exploit, so all someone has to do was visit a website via safari, drag the ever so familiar slide to unlock slider across, triggering the said image to be loaded, and jailbreak the device.
Render time arbitrary execution bugs have also existed in fonts and other benign sounding media types, on all OS and platforms. This is really not that special and is just another high impact security bug that got patched.
I thought it was reference to tiff in a png? It’s been far too long, but you’re right, PDF was certainly also a vector in a slightly later incarnation I remember :)
The very first jailbreak was from a similar exploit, so all someone has to do was visit a website via safari, drag the ever so familiar slide to unlock slider across, triggering the said image to be loaded, and jailbreak the device.
Render time arbitrary execution bugs have also existed in fonts and other benign sounding media types, on all OS and platforms. This is really not that special and is just another high impact security bug that got patched.
It would load a PDF in safari. Back in the good old days of jailbreak.me.
I thought it was reference to tiff in a png? It’s been far too long, but you’re right, PDF was certainly also a vector in a slightly later incarnation I remember :)