The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "LibTiff Exploit"
4039jbuser (talk | contribs) |
m |
||
(3 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
{{lowercase}} |
{{lowercase}} |
||
− | The '''libTiff Exploit''' is used to jailbreak |
+ | The '''libTiff Exploit''' is an exploit that can be used to [[jailbreak]] iPhone OS 1.0-1.1.1. It is patched as of 1.1.2. |
+ | It was used by [https://forums.macrumors.com/threads/377126/ planetbeing's jailbreak] and [[AppSnapp]]. [https://mtmdev.org/blog/mtm-devadmin/2018/ios-1-1-1-jailbreak cipher's] version was released in 2018 due to AppSnapp being offline. |
||
− | This is exploitable on all previous firmwares (1.0-1.1) as well, as proven in the 4039JB. |
||
== Credit == |
== Credit == |
Latest revision as of 13:32, 9 October 2018
The libTiff Exploit is an exploit that can be used to jailbreak iPhone OS 1.0-1.1.1. It is patched as of 1.1.2.
It was used by planetbeing's jailbreak and AppSnapp. cipher's version was released in 2018 due to AppSnapp being offline.
Credit
taviso, cmw (aka Niacin), Dre, MetaSploit, rezn, dinopio, drudge, kroo, pumpkin, davidc, dunham, planetbeing, NerveGas
Exploit
There was a buffer overflow in the iPhone's libtiff. This was exploited to run a small application to jailbreak and patch libtiff. This exploit was also used for PSP homebrew, which cmw also worked on. The source code of the exploit was later released by cmw on his blog.