Vulnerabilities: Difference between revisions
No edit summary |
|||
Line 9: | Line 9: | ||
=== SnagFilms === | === SnagFilms === | ||
A possible exploit has been found in the SnagFilms App in the Playstation Store App. | A possible exploit has been found in the SnagFilms App in the Playstation Store App. | ||
Arbitrary code execution in memory has been demonstrated, although so far the system | Arbitrary code execution in memory has been demonstrated, although so far the system | ||
will throw an exception in system memory before the payload finishes loading. | will throw an exception in system memory before the payload finishes loading. | ||
If you craft a small enough payload and/or a payload that load's without causing | If you craft a small enough payload and/or a payload that load's without causing | ||
an exception in program memory you can most likely get code execution working. | an exception in program memory you can most likely get code execution working. | ||
Revision as of 17:38, 17 April 2015
VidNow
A possible exploit has been found in VidNow App in the Playstation Store App .
PATCHED: Sony has hotfixed this exploit via content hashing the file while in transit.
UPDATE: Some have managed to reverse the hotfix but the method is not known - the PS4 checks the content
hash HTTP header from the HMAC header.
SnagFilms
A possible exploit has been found in the SnagFilms App in the Playstation Store App.
Arbitrary code execution in memory has been demonstrated, although so far the system
will throw an exception in system memory before the payload finishes loading.
If you craft a small enough payload and/or a payload that load's without causing
an exception in program memory you can most likely get code execution working.
Patched
WebKit
WebKit/536.26 exploit on System Firmware 1.760.000 and lower (patched in 2.000.000)
http://wololo.net/2014/10/24/webkit-exploit-confirmed-to-run-on-ps4-firmware-1-76/
|