Blog | G5 Cyber Security

DEF CON 2019: New Class of SQLite Exploits Open Door to iPhone Hack

Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context of a browser for the first time. The new attack techniques exploit memory-corruption issues in the SQLite engine itself, leading to a host of new hacks, including code execution on an iOS device. Check Point demonstrated at the show how an attack against SQLite could be used to bypass the iPhone s secure boot mechanism in iOS by replacing the contacts database (AddressBook.sqlitedb) prior to reboot with a rogue database.

Source: https://threatpost.com/sqlite-exploits-iphone-hack/147203/

Exit mobile version