Editing Vulnerabilities

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 204: Line 204:
See the [https://www.psdevwiki.com/ps4/Vulnerabilities#FW_%3C=_11.00_-_Remote_vulnerabilities_in_spp_(yielding_kernel_ASLR_defeat)_(CVE-2006-4304_and_no-CVE) PS4 wiki].
See the [https://www.psdevwiki.com/ps4/Vulnerabilities#FW_%3C=_11.00_-_Remote_vulnerabilities_in_spp_(yielding_kernel_ASLR_defeat)_(CVE-2006-4304_and_no-CVE) PS4 wiki].


Note that kernel ASLR defeat is currently not working on PS5 and there are protections remaining before being able to get ROP chain execution in kernel.
Note that kernel ASLR defeat is currently not working on PS5 and there are protections remaining before being able to  


=== Patched ===
=== Patched ===
Line 259: Line 259:
== SMAP bypass (CVE-2021-29628) ==
== SMAP bypass (CVE-2021-29628) ==


See also [https://www.psdevwiki.com/ps4/Vulnerabilities#Kernel_SMAP PS4 SMAP bypass].
See also [https://www.psdevwiki.com/ps4/Vulnerabilities#Kernel_SMAP].


=== Credits ===
=== Credits ===
Line 267: Line 267:
=== Analysis ===
=== Analysis ===


* [https://hackerone.com/reports/1048322 HackerOne report for CVE-2021-29628 by m00nbsd (2020-12-01)]
* [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29628 CVE-2021-29628 (FreeBSD SMAP bypass) by m00nbsd]
* [https://reviews.freebsd.org/D30276 FreeBSD fix commit by kib (2021-05-15)]
* [https://hackerone.com/reports/1048322 CVE-2021-29628 (PS5 SMAP bypass) by m00nbsd]
* [https://github.com/freebsd/freebsd-src/commit/fb580451456aa769daa2f4b2f077e39692f80c62 FreeBSD fix commit by markjdb (2021-05-16)]
* [https://www.freebsd.org/security/advisories/FreeBSD-SA-21:11.smap.asc FreeBSD advisory for CVE-2021-29628 (2021-05-26)]


=== Bug Description ===
=== Bug Description ===


In FreeBSD 13.0-STABLE before n245764-876ffe28796c, 12.2-STABLE before r369857, 13.0-RELEASE before p1, and 12.2-RELEASE before p7, a system call triggering a fault could cause SMAP protections to be disabled for the duration of the system call. This weakness could be combined with other kernel bugs to craft an exploit. It does not work on PS4 because PS4 kernel is based on FreeBSD 9 which did not contain the vulnerability and because PS4 SMAP does not come from FreeBSD but is custom from Sony. It used to work on PS5 before it was disclosed and patched.
A SMAP bypass has been found by m00nbsd while working on FreeBSD 12. It is named CVE-2021-29628 and affects FreeBSD 12.2 and later (til it was patched). It does not work on PS4 because PS4 kernel is based on FreeBSD 9 which did not contain the vulnerability and because PS4 SMAP does not come from FreeBSD but is custom from Sony. It used to work on PS5 before it was disclosed and patched.


=== Patched ===
=== Patched ===
Line 311: Line 309:


= Hypervisor =
= Hypervisor =
== <=4.51 - Hypervisor bypass vulnerability ==
* Discovered by anonymous (probably fail0verflow or TheFloW). Announced by Flatz (2024-10-05).
* Patched since PS5 FW 5.00.
== <=2.50 - Hypervisor vulnerability leading to compromise and XOM bypass ==
* Discovered by Specter (2023-07-01) and Flatz (before 2023-07-27).
* Exploited privately by Specter and ChendoChap (2024-09-29).
* Will be disclosed publicly at Hardwear.io 2024 conference (2024-10-24).
* Patched since PS5 FW 3.00.


== <=2.50 - Hypervisor integrated as part of the kernel binary ==
== <=2.50 - Hypervisor integrated as part of the kernel binary ==


* Discovered by Specter (2023-07-01) and Flatz (before 2023-07-27).
* Discovered by Specter (2023-07-01) and Flatz (before 2023-07-27).
* Exploited privately by Specter and ChendoChap (2024-09-29).


* This makes Hypervisor exploitation easier as it can be triggered by usermode directly without the need of a kernel exploit.
* This makes Hypervisor exploitation easier as it can be triggered by usermode directly without the need of a kernel exploit.


* See [[Hypervisor#In-Kernel_Hypervisor_.28.3C.3D_2.50.29]] and [https://wololo.net/2023/07/02/ps5-specterdev-shares-details-on-in-kernel-hypervisor-earlier-versions-of-the-ps5-hypervisor-found-in-firmwares/ wololo article (2023-07-02)].
* See [[Hypervisor#In-Kernel_Hypervisor_.28.3C.3D_2.50.29]] and [https://wololo.net/2023/07/02/ps5-specterdev-shares-details-on-in-kernel-hypervisor-earlier-versions-of-the-ps5-hypervisor-found-in-firmwares/ wololo article (2023-07-02)].
* This also allows to dump kernel .text segment once one has code execution in hypervisor. See [https://x.com/SpecterDev/status/1840303332763512837 Specter's tweet about PS5 kernel .text dump].


* Patched since PS5 FW 3.00.
* Patched since PS5 FW 3.00.
Please note that all contributions to PS5 Developer wiki are considered to be released under the GNU Free Documentation License 1.2 (see PS5 Developer wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following hCaptcha:

Cancel Editing help (opens in new window)