iPhone Jailbreak Uses a PDF Display Vulnerability 289
adeelarshad82 writes "Latest reports indicate that the website that 'jailbreaks' iPhones, iPads, and iPod Touches does so by means of a PDF-based vulnerability in OS X. PDF parsing and rendering is a core feature of OS X, and there have been several other vulnerabilities in the past in iOS CoreGraphics PDF components." As Gruber points out, the proper term for this is not "jailbreak," but "remote code exploit in the wild."
This is really tiresome (Score:2, Interesting)
Is it really so hard to write a document viewer that can not crash? These aren't small companies. We're talking about Apple, Adobe, Microsoft here. Can't they at least get the core functionality right? I'll settle for safe if getting it right is too much to ask for.
Re:LOL (Score:4, Interesting)
No the REAL LOL is the advertisement on this page.
Vulnerability Management for Dummies
Whatever Slashdot uses for it's adserver, I applaud.
Re:It's a feature... (Score:1, Interesting)
Really says a lot about Apple's advertising budget if the mass media is treating this as a feature and not freaking out that every iPad and iPhone in the world is currently vulnerable to the kind of drive-by malware that turned Internet Explorer into a laughing-stock.