Editing Vulnerabilities
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 989: | Line 989: | ||
== sceKernelLoadExec buffer overflow by hitchhikr / Neural: PSP 2.01-2.60 == | == sceKernelLoadExec buffer overflow by hitchhikr / Neural: PSP 2.01-2.60 == | ||
There | There was one subroutine that took a path as an argument. It looked for the character ":" in that path, and calculated the length of the drive name from that (e.g. "ms0:"). It then copied the drive name onto the stack with strncpy. | ||
In later System Software versions, loadexec checks if the drive name is longer than 0x1F bytes. If it is, it returns an error. Look at sub_21E0 in 6.60 loadexec_01g.prx. | In later System Software versions, loadexec checks if the drive name is longer than 0x1F bytes. If it is, it returns an error. Look at sub_21E0 in 6.60 loadexec_01g.prx. |