Vulnerabilities
Unknown / unpatched[edit | edit source]
Hypervisor HTAB glitch[edit | edit source]
Credits[edit | edit source]
- geohot (2009-2011) for initial HTAB glitch
- xorloser (2009-2010) for XorHack and XorHack v2.0
- zecoxao (2023) for some tests and writeups
- Kafuu / aomsin2526 (2025) for reimplementation on recent hardware (superslim PS3) and software (4.92) revisions
Bug Description[edit | edit source]
See also the SPU LS Overflow Exploit.
Analysis[edit | edit source]
- [1]
- geohot's archives
- geohot's blog
- xorloser's blog
- xorhack.zip by xorloser
- XorHack: The PS3 Exploit Toolkit by xorloser
- XorHack v2.0: The Updated PS3 Exploit Toolkit by xorloser
Implementation[edit | edit source]
Patched[edit | edit source]
Not patchable because it is a hardware vulnerability.
WebKit parseFloat() type confusion leading to stack buffer overflow[edit | edit source]
Credits[edit | edit source]
- Zuk Avraham
- TODO
Bug Description[edit | edit source]
When inserting NaN with a parameter as an argument into parseFloat(), we can overflow the tiny buffer created by parseFloat().
Analysis[edit | edit source]
Implementation[edit | edit source]
Patched[edit | edit source]
Patched on PS3 FW 4.83. Remains exploitable on higher firmwares by installing old WebKit sprx files in hybrid PUP.
WebKit CSS font face source type confusion leading to read primitive[edit | edit source]
Credits[edit | edit source]
TODO
Bug Description[edit | edit source]
While parsing the source of a CSS font face, CSSParser::parseFontFaceSrc() assumes the value given is a string, but if we insert a specific double value into an exploitable function like insert() or format(), we can leak the memory via an overlap between two variables.
Implementation[edit | edit source]
- PS3HEN on PS3 by the PS3Xploit team
- [2] initial bug report
Patched[edit | edit source]
Patched on PS3 FW 4.83. Remains exploitable on higher firmwares by installing old WebKit sprx files in hybrid PUP.
RSX VRAM Access[edit | edit source]
Patched[edit | edit source]
Not Patched.
Memory corruption and NULL pointer in Unreal Tournament III 1.2[edit | edit source]
Unsure if it applies to PS3.
MacOS X 10.5/10.6 libc/strtod(3) buffer overflow[edit | edit source]
Unsure if it applies to PS3.
OpenPrinter() stack-based buffer overflow[edit | edit source]
Patched[edit | edit source]
?patched?
DOM flaw[edit | edit source]
http://seclists.org/fulldisclosure/2009/Jul/299
Patched[edit | edit source]
?patched?
PS3Xploit Kernel Exploit[edit | edit source]
Credits[edit | edit source]
- Team PS3Xploit
- TODO
Bug description[edit | edit source]
To be disclosed.
Implementation[edit | edit source]
Patched[edit | edit source]
Not patched as of PS3 FW 4.90.
Leakage of PTCH body plaintext over SPI on all BGA SYSCONs[edit | edit source]
When reading the body via the EEPROM read command, in all cases, the MISO of the SPI will leak the plaintext of the PTCH body to someone who might be interacting with the EEPROM interface. Note that this ONLY happens when SC interacts with patch body and some specific areas.
Examples[edit | edit source]
MISO[edit | edit source]
04 C8 34 30 BD E4 9F 27 16 DE 5C C1 E7 A3 DA 9C 7F 5B 29 9A 5A 48 5C 14 ED B2 DE 28 84 43 68 82 98 87 4E D4 62 51 01 A9 24 34 02 B3 FF 26 63 17 77 8E 95 56 B1 5F 9F 22 93 46 DE 4E 3A 5E 8A D3
MOSI[edit | edit source]
3C 3A 04 3F 25 A6 68 09 02 00 04 00 00 00 00 00 (0x26B0) 3C 3A 04 3F 71 AD 00 00 09 00 00 00 00 00 00 00 (0x26C0) 3C 3A 04 3F 8E D5 75 0D 00 00 00 00 00 00 00 00 (0x26D0) 3C 3A 04 3F 80 86 48 0B 0B 00 03 00 00 00 00 00 (0x26E0)
Patched[edit | edit source]
Lv2 sys_fs_mount stack overflow[edit | edit source]
Stack buffer overflow with required privileges when passing a length greater than 10. It now checks for length less than or equal to 10. If larger than 10, the length gets set to 10.
Patched: sometime before 4.40 (only fw I checked)
RSX Syscall bug[edit | edit source]
In most syscalls sony reduces a pointer to 32 bits and would use a special function to write to that pointer.
however, in certain rsx syscalls, sony forgot about it, allowing the attacker to write to any part of lv2 memory.
Patched: 4.40
Lv2 sys_prx_register_module stack overflow[edit | edit source]
Stack buffer overflow which is fixed around 4.3x or 4.4x. Does not require any privileges.
Lv2 578 Syscall stack overflow[edit | edit source]
Stack buffer overflow which is fixed around 4.3x or 4.4x. Requires root privileges. Syscall is compiled with stack cookies.
Patched: 4.4x
AES CTR vulnerability on SELFs (and ebootroms maybe?)[edit | edit source]
Sometimes SCE reused the same AES CTR keys and IVs in different Certified Files.
See also [7].
See also [8].
Patched: since some PS Vita prototype FWs as their Certified Files started having always different IVs.
Maybe not patched on PS3 ebootroms.
PARAM.SFO stack-based buffer overflow[edit | edit source]
Patched: since 2012-05-01 (4.40 and later)
Proof of Concept[edit | edit source]
Unsigned code can be added to the PARAM.SFO because the console does not recognize special characters.
Working on 4.31. Patched: since 2012-05-01 (4.40 and later).
PoC: PARAM.SFO
PSF�� Ä @� � � � � � ��� � � � ��� � � � ��h � � % � � � �� , � � � �� 4 ��� � $� C ��� @ (� V ��� � h� j �� € p� t ��� € ð� ACCOUNT_ID ATTRIBUTE CATEGORY DETAIL PARAMS PARAMS2 PARENTAL_LEVEL SAVEDATA_DIRECTORY SAVEDATA_LIST_PARAM SUB_TITLE TITLE 40ac78551a88fdc SD PSHACK: Benjamin Ninja H%20'>"<[PERSISTENT INJECTED SYSTEM COMMAND OR CODE!] Hackizeit: 1:33:07 ExpSkills: VL-LAB-TRAINING Operation: 1% Trojaners: 0% ... Õõ~\˜òíA×éú�;óç� 40ac78551a88fdc ... BLES00371-NARUTO_STORM-0 HACKINGBKM 1 PSHACK: Benjamin Ninja H%20'>"<[PERSISTENT INJECTED SYSTEM COMMAND OR CODE!];
AVP patch bypass exploit[edit | edit source]
Patched: since 3.70 and later.
PSN security intrusion[edit | edit source]
Patched: since 3.61 enforced password change
Sony PSN Account Service - Password Reset Vulnerability[edit | edit source]
Patched: since 2012-05-01
ECDSA private key non-random fail[edit | edit source]
See fail0verfl0w talk.
Patched: since 3.56
JIG downgrade[edit | edit source]
Patched: since 3.56
USB config heap-based buffer overflow (PSjailbreak/PSGroove)[edit | edit source]
Patched: since 3.42 and later
Leap year bug[edit | edit source]
Patched: since 3.40 and later
MP4 vulnerability[edit | edit source]
Patched: since 3.21 and later
CELL Reset Exploit[edit | edit source]
See CELL Reset Exploit.
This vulnerability was documented on 12 March 2011 by Defyboy
This exploit relies on the fact that RAM is not cleared on reset of the CELL processor. Simply pull the cell_reset line on the processor for around 60 ns and the CELL processor will reset without clearing RAM and begin the boot process again. This hack is largely useless except in special circumstances.
Patched: it is not patched as of 3.55 but useless since 3.15 and later
[edit | edit source]
Patched: since 3.10 and later
Open Remote Play[edit | edit source]
Patched: since 2.80 and later
BD-J homebrew[edit | edit source]
Patched: since 2.50 and later
However, this "patched" claim is not precise enough and BD-JB like on PS4 and PS5 may be possible.
System Software Downgrade with hardware flasher[edit | edit source]
See also: Downgrading with Hardware flasher.
Patched: since 2.20 and later (by adding CoreOS hashing in Syscon to be checked by hypervisor; worked around by patching hypervisor on 3.56 and lower capable consoles).
Full RSX access in OtherOS[edit | edit source]
Patched: since 2.10 and later
Web browser DoS via a large integer value for the length property of a Select object[edit | edit source]
Patched: since 4 sept 2009
Remote Play UDP packets DoS[edit | edit source]
Affected: 2.10 and PSP 3.10 OE-A
Patched: since 13 nov 2008
Resistance: Fall of Man network update exploit[edit | edit source]
Patched ?was the physical version actually patched?
Resistance: Fall of Man is a 2006 first-person shooter video game developed by Insomniac Games and published by Sony Computer Entertainment for the PlayStation 3. The game used a different system to download the game updates, by entering the multiplayer modes, unlike most titles which search for updates from the XMB or after starting them. This different system was required because at the time of development of the game the PS3 OS was not supporting game updates via XMB. The Resistance: Fall of Man update system contained a vulnerability.
As of December 11, 2008, all map packs for Resistance: Fall of Man were made available for free as a holiday gift from Insomniac due to the release of Resistance 2. All map packs are available for local split-screen multiplayer.
The map packs were removed from PlayStation Store in March 2014, although only in Europe. They are still available on PlayStation Store in USA although they cannot be used because of the aforementioned server closure. Since the game used a different system to download the game updates (by entering the multiplayer modes, unlike most titles which search for updates from the XMB or after starting them), and since the updates were required for DLC compatibility, the map packs became usable only by people who downloaded the updates before the server closure, in March 2014. Shortly after the closure of the game servers, a digital version of the game was released on PlayStation Store, exclusively in Europe. It comes with all game updates and map packs, and full compatibility with savedata from the physical edition.
Warhawk network update exploit[edit | edit source]
Patched ?was the physical version actually patched?
Warhawk was a 2007 online multiplayer third-person shooter video game developed by Incognito Entertainment and published by Sony Computer Entertainment for the PlayStation 3. It was the first PlayStation 3 game to be available both physically and digitally on the PlayStation Network.
The game used a different system to download the game updates, by entering the multiplayer modes, unlike most titles which search for updates from the XMB or after starting them. This different system was required because at the time of development of the game the PS3 OS was not supporting game updates via XMB. The Warhawk update system contained a vulnerability.
Game Bugs patched via Firmware[edit | edit source]
Afro Samurai Black Screen[edit | edit source]
The Afro Samurai game on PS3 gives a black screen as a failed attempt to call:
cellAudioOutConfigure cellSysutilAvconfExt_FA611DF4
Occurs in Firmware 3.01
BLUS30264 NPUB90215 BLES00516
In order to fix this problem, start up your PlayStation 3 system and while on the XMB (Cross Media Bar/System Menu), go to "Settings" and select "Sound Settings" from here select "Audio Multi-Output" and set this option to "OFF". You should be able to play the Afro Samurai Demo or update the retail game properly to the latest patch after this.
Source: [13]
Patched: in (VSH) since (unknown but after 3.01)
It is not a bug! It is a scekrit feature![edit | edit source]
Renesas verify function works on 4 byte values in All renesas/nec SysCon chips[edit | edit source]
All NEC/Renesas syscon chips have their verify function working for a 4 byte array but 256 byte size, increasing the probability of finding the correct bytes as opposed to the intended 256 bytes.
(Universal) Renesas checksum function works on 256 byte values (ALL SYSCON CHIPS, stock, PSP, PS Vita, PS3, PS4)[edit | edit source]
Renesas checksum feature works on 256 byte values instead of the intended block size, which means glitching could be done in a narrower margin, making the efforts a lot easier. it is also possible to identify 256 byte constants contiguous to each other by their checksums.