Researchers at Check Point have identified a new class of vulnerabilities targeting SQLite, outside the context of a browser for the first time. The new attack techniques exploit memory-corruption issues in the SQLite engine itself, leading to a host of new hacks, including code execution on an iOS device. Check Point demonstrated at the show how an attack against SQLite could be used to bypass the iPhone s secure boot mechanism in iOS by replacing the contacts database (AddressBook.sqlitedb) prior to reboot with a rogue database.
Source: https://threatpost.com/sqlite-exploits-iphone-hack/147203/