Vulnerabilities: Difference between revisions

From PS4 Developer wiki
Jump to navigation Jump to search
No edit summary
Line 1: Line 1:
=== VidNow ===
== WebKit ==
==== Int32 bug ====
[[Internet_Browser#Webkit_exploit|WebKit/536.26 exploit]] on [[System Firmware]] [[1.760.000]] and lower '''(patched in [[2.000.000]])'''
<br/>http://wololo.net/2014/10/24/webkit-exploit-confirmed-to-run-on-ps4-firmware-1-76/
 
==== ? ====
[[Internet_Browser#Webkit_exploit|WebKit/537.73 exploit]] on [[System Firmware]] [[2.040.000]] and lower '''(patched in [[2.508.000]])'''
<br/>https://github.com/Fire30/PS4-2014-1303-POC
 
==== from Vita? ====
[[Internet_Browser#Webkit_exploit|WebKit/??? exploit]] on [[System Firmware]] [[3.550.000]] and lower '''(patched in [[4.000.000]])'''
<br/>https://github.com/Fire30/PS4-3.55-Code-Execution-PoC
 
 
== Kernel Sploits ==
==== DynamicalLibraryPepareClose (dlclose) ====
 
==== BadIntegerReturn (badIRET) ====
 
 
== First Steps ==
==== VidNow ====
A possible exploit has been found in VidNow App in the Playstation Store App .
A possible exploit has been found in VidNow App in the Playstation Store App .


Line 7: Line 28:
         hash HTTP header from the HMAC header.
         hash HTTP header from the HMAC header.


=== SnagFilms ===
==== SnagFilms ====
A possible exploit has been found in the SnagFilms App in the Playstation Store App.
A possible exploit has been found in the SnagFilms App in the Playstation Store App.


Line 16: Line 37:
http://i.imgur.com/5OrSFCa.jpg
http://i.imgur.com/5OrSFCa.jpg


== Patched ==
=== WebKit ===
[[Internet_Browser#Webkit_exploit|WebKit/536.26 exploit]] on [[System Firmware]] [[1.760.000]] and lower (patched in [[2.000.000]])
http://wololo.net/2014/10/24/webkit-exploit-confirmed-to-run-on-ps4-firmware-1-76/
[[Internet_Browser#Webkit_exploit|WebKit/537.73 exploit]] on [[System Firmware]] [[2.040.000]] and lower (patched in [[2.508.000]])
https://github.com/Fire30/PS4-2014-1303-POC
[[Internet_Browser#Webkit_exploit|WebKit/??? exploit]] on [[System Firmware]] [[3.550.000]] and lower (patched in [[4.000.000]])
https://github.com/Fire30/PS4-3.55-Code-Execution-PoC


{{Reverse Engineering}}
{{Reverse Engineering}}
<noinclude>[[Category:Main]]</noinclude>
<noinclude>[[Category:Main]]</noinclude>

Revision as of 15:51, 25 September 2016

WebKit

Int32 bug

WebKit/536.26 exploit on System Firmware 1.760.000 and lower (patched in 2.000.000)
http://wololo.net/2014/10/24/webkit-exploit-confirmed-to-run-on-ps4-firmware-1-76/

?

WebKit/537.73 exploit on System Firmware 2.040.000 and lower (patched in 2.508.000)
https://github.com/Fire30/PS4-2014-1303-POC

from Vita?

WebKit/??? exploit on System Firmware 3.550.000 and lower (patched in 4.000.000)
https://github.com/Fire30/PS4-3.55-Code-Execution-PoC


Kernel Sploits

DynamicalLibraryPepareClose (dlclose)

BadIntegerReturn (badIRET)

First Steps

VidNow

A possible exploit has been found in VidNow App in the Playstation Store App .

PATCHED: Sony has hotfixed this exploit via content hashing the file while in transit.

UPDATE: Some have managed to reverse the hotfix but the method is not known - the PS4 checks the content

        hash HTTP header from the HMAC header.

SnagFilms

A possible exploit has been found in the SnagFilms App in the Playstation Store App.

Arbitrary code execution in memory has been demonstrated, although so far the system will throw an exception in the programs memory before the payload finishes loading.

If you craft a small enough payload and/or a payload that load's without causing an exception in program memory you can most likely get code execution working.

http://i.imgur.com/5OrSFCa.jpg