Jump to content

[Discussion] The iOS 9.3.2 jailbreak exploit is publicly available


6 posts in this topic

Recommended Posts

Posted (edited)

You already may have seen the iOS 9.3.2 jailbreak video posted today. The exploit that he is using is publicly available. It is the same that is currently used to crash the ps4 web browser which could lead to a potential ps4 jailbreak on the latest firmware.

Everyone can try it on their iOS devices and you will see that safari will not be able to load the page (tab will crash), where other browsers like chrome will not have a problem with that. Here it is:

https://github.com/WebKit/webkit/commit/98845d940e30529098eea7e496af02e14301c704

After the crash he probably partialy used some of the old jailbreakMe code to do the actual jailbreak and install cydia which is also publicly available:

https://github.com/comex/star_

Since it is already available for public, it will be fixed for 100% in the next iOS release, so hopefully someone skilled will release this jailbreak soon as long as iOS 9.3.2 is still signed or another exploit will be wasted.

Remember the Zerodium bounty (https://zerodium.com/ios9.html)? Pangu never considered it. Their reasons;

Source - Ruxcon Security Conference:

pangu-vs-million-dollar-bounty.jpg

 

Yes, there is always TaiG, but given that they are also security researchers, they most likely will not use this either for the same reasons as Pangu.

A jailbreak will come soon enough, just be patient, but don't expect it to be remotely available like this

Updated by nick maddinson
Posted

So what? I update my 9.3.1 non-JB to 9.3.2 and then I'll be able to JB my phone?

 

 

So just go to that link on IOS device?

no guys , it's just an exploit , i recommend someone to use this exploit to create a jaibreak , and it's better to stay on without updating to any new version, @@Thebat in your case you should stay at 9.3.1

×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines