Editing Vulnerabilities
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 20: | Line 20: | ||
== PSP Game Savedata == | == PSP Game Savedata == | ||
=== Before PS Vita era === | === Before PS Vita era === | ||
==== Grand Theft Auto: Liberty City Stories UMD ( | ==== Grand Theft Auto: Liberty City Stories UMD (Goofy exploit): PSP 2.00-3.03. Patched 3.30 ==== | ||
Discovered by Edison Carter | Discovered by Edison Carter. | ||
The GTA LCS exploit is a classic stack buffer overflow, in the savedata processing. In essence, the savedata mostly consists of a large structure, with an element indicating the total size. GTA LCS allocates a statically-sized buffer for this to be read into, on the stack - presumably using sizeof(savestruct) or similar. But it copies the number of bytes given by the .size element from the savedata into the stack buffer. By editing the .size element in the saved data, we can therefore force a buffer overflow. The .size element is at offset 0004 in the DATA.BIN file, in the savedata folder. Note that the DATA.BIN is encrypted, so you need to use something like the savedata sample from the pspsdk in order to modify it. | |||
The Exploit was patched in a second batch of UMD prints. | |||
Germany version: | Germany version: | ||
Line 113: | Line 47: | ||
Another indication is the copyright date: if it is 2005 then it is unpatched, else it is 2006 and is patched. | Another indication is the copyright date: if it is 2005 then it is unpatched, else it is 2006 and is patched. | ||
==== Lumines (Illuminati exploit): PSP <= 3.50. Patched 3.51 ==== | ==== Lumines (Illuminati exploit): PSP <= 3.50. Patched 3.51 ==== | ||
==== Gripshift by Matiaz: PSP <= 5.02?-5.03?. Patched 5.05 ==== | |||
==== Patapon 2 demo (USA) by Malloxis: PSP <= ?6.20? ==== | |||
==== | |||
==== Medal Of Honor Heroes, or Heroes 2, or both by kgsws: PSP <=? ==== | |||
2009-07-10 | |||
https://wololo.net/2009/07/10/medal-of-honor-heroes-the-coolest-exploit-ever/ | https://wololo.net/2009/07/10/medal-of-honor-heroes-the-coolest-exploit-ever/ | ||
https://www.brewology.com/downloads/download.php?id=9900 | https://www.brewology.com/downloads/download.php?id=9900 | ||
https://www.dcemu.co.uk/vbulletin/threads/224663-Medal-of-Honor-Heroes-(MOHH)-second-exploit | https://www.dcemu.co.uk/vbulletin/threads/224663-Medal-of-Honor-Heroes-(MOHH)-second-exploit | ||
=== During PS Vita era === | === During PS Vita era === | ||
Line 294: | Line 165: | ||
==== "Jikkyou Powerful Pro Yakyu 2012 Ketteiban" (Japanese: 実況パワフルプロ野球 2012決定版) (ULJM06206) by 173210: <= 2.61 ==== | ==== "Jikkyou Powerful Pro Yakyu 2012 Ketteiban" (Japanese: 実況パワフルプロ野球 2012決定版) (ULJM06206) by 173210: <= 2.61 ==== | ||
==== Pipe Madness by Frostegater: <= 2.61. Patched 3.00 ==== | ==== Pipe Madness by Frostegater: <= 2.61. Patched 3.00 ==== | ||
Line 345: | Line 212: | ||
==== MyStylist: <= 3.15 ==== | ==== MyStylist: <= 3.15 ==== | ||
==== Skate Park City | ==== Skate Park City: <= 3.15. Patched 3.18 ==== | ||
==== Space Invaders Extreme: <= 3.18 ==== | ==== Space Invaders Extreme: <= 3.18 ==== | ||
Line 359: | Line 224: | ||
==== Gladiator Begins Demo (NPEH90050, NPUH90077, NPJH90084) by qwikrazor87: <= 3.18 ==== | ==== Gladiator Begins Demo (NPEH90050, NPUH90077, NPJH90084) by qwikrazor87: <= 3.18 ==== | ||
Discovered | Discovered around 2014-09-12 by qwikrazor87. | ||
https://wololo.net/talk/viewtopic.php?t=39771 | https://wololo.net/talk/viewtopic.php?t=39771 | ||
Line 377: | Line 238: | ||
https://bitbucket.org/Acid_Snake/ark-2/src/master/exploit/usploit/wid_od_2_eu/ | https://bitbucket.org/Acid_Snake/ark-2/src/master/exploit/usploit/wid_od_2_eu/ | ||
==== Patapon: <= 3.18 ==== | ==== Patapon 1: <= 3.18 ==== | ||
==== Talkman Travel: Tokyo: <= 3.18 ==== | ==== Talkman Travel: Tokyo: <= 3.18 ==== | ||
Line 388: | Line 249: | ||
==== Patapon 2 non-demo (UCES01177): <= 3.36 ==== | ==== Patapon 2 non-demo (UCES01177): <= 3.36 ==== | ||
https://wololo.net/2019/08/13/hacking-consoles-a-learning-journey-part-4/ | https://wololo.net/2019/08/13/hacking-consoles-a-learning-journey-part-4/ | ||
Line 410: | Line 269: | ||
==== Ape Escape: On the Loose: <= 3.50. Patched 3.51 ==== | ==== Ape Escape: On the Loose: <= 3.50. Patched 3.51 ==== | ||
==== "Toukiden: Kiwami (DEMO)" (討鬼伝 極 体験版) by 173210: <= 3.51 ==== | ==== "Toukiden: Kiwami (DEMO)" (討鬼伝 極 体験版) by 173210: <= 3.51 ==== | ||
Line 419: | Line 274: | ||
https://code.google.com/archive/p/valentine-hbl/source/default/source | https://code.google.com/archive/p/valentine-hbl/source/default/source | ||
==== Puzzle Scape: <= 3.52 ==== | |||
==== Puzzle Scape | |||
==== World of Pool, Pool Hall Pro: <= 3.52 ==== | ==== World of Pool, Pool Hall Pro: <= 3.52 ==== | ||
Line 445: | Line 282: | ||
https://github.com/173210/psp_exploits/ | https://github.com/173210/psp_exploits/ | ||
=== | === After PS Vita era === | ||
==== ScrabbleTM by ChampionLeake: probably not patched, 2018-05-17 ==== | |||
https://github.com/ChampionLeake/scrabblehax | |||
==== | ==== Carol Vorderman's Sudoku by ChampionLeake: probably not patched, 2019-04-22 ==== | ||
https://github.com/ChampionLeake/SudokuSTACK | |||
https://github.com/ChampionLeake/ | |||
=== Remarks === | === Remarks === | ||
Line 476: | Line 304: | ||
== PS1 Game Savedata == | == PS1 Game Savedata == | ||
=== Noon (NPJJ00466) by qwikrazor87 or Acid_snake === | |||
=== Noon (NPJJ00466) by qwikrazor87 | |||
Discovered around 2014- | Discovered around 2014-10-03 by qwikrazor87 or Acid_snake. | ||
=== Harvest Moon: Back To Nature (NPEF00286, NPUJ01115) by qwikrazor87 or Acid_snake === | |||
Discovered around 2015-09-28 by qwikrazor87 or Acid_snake. | |||
Once you have installed the exploit file, start Harvest Moon, then after about 20 seconds the screen should flash white. | |||
=== Tekken 2 by qwikrazor87 or Acid_snake === | |||
Discovered around 2014-02-10 by qwikrazor87 or Acid_snake. | |||
Implemented in TN-X by Total_Noob and qwikrazor87. | |||
https://wololo.net/downloads/index.php/download/8275 | https://wololo.net/downloads/index.php/download/8275 | ||
Line 508: | Line 324: | ||
https://hackinformer.com/PlayStationGuide/PSV/_exploitgames.html | https://hackinformer.com/PlayStationGuide/PSV/_exploitgames.html | ||
=== Sports Superbike 2 (SLES03827) / XS Moto by qwikrazor87 | === Sports Superbike 2 (SLES03827) / XS Moto by qwikrazor87 and Acid_snake === | ||
Discovered around 2014-07-24 by qwikrazor87 or Acid_snake. Released on 2015-03-12 by Total_Noob. | |||
Implemented in TN-X by Total_Noob and qwikrazor87. | |||
https://wololo.net/downloads/index.php/download/8275 | https://wololo.net/downloads/index.php/download/8275 | ||
Line 524: | Line 342: | ||
https://alex-free.github.io/tonyhax-international/save-game-exploit.html | https://alex-free.github.io/tonyhax-international/save-game-exploit.html | ||
=== Crash Bandicoot 2: Cortex Strikes Back by | === Crash Bandicoot 2: Cortex Strikes Back by ?alex-free? === | ||
https://alex-free.github.io/tonyhax-international/save-game-exploit.html | https://alex-free.github.io/tonyhax-international/save-game-exploit.html | ||
=== Crash Bandicoot 3: Warped by ?alex-free? === | |||
=== Crash Bandicoot 3: Warped by | |||
https://alex-free.github.io/tonyhax-international/save-game-exploit.html | https://alex-free.github.io/tonyhax-international/save-game-exploit.html | ||
=== Doki Oki (Japanese: 土器王紀) (NPJJ00560) by ?alex-free? === | === Doki Oki (Japanese: 土器王紀) (NPJJ00560) by ?alex-free? === | ||
Line 548: | Line 358: | ||
Compare with the [https://www.psdevwiki.com/ps1/index.php?title=Vulnerabilities list of PS vulnerabilities on the PS1 dev wiki]. | Compare with the [https://www.psdevwiki.com/ps1/index.php?title=Vulnerabilities list of PS vulnerabilities on the PS1 dev wiki]. | ||
== | == System == | ||
=== | === libtiff exploit #1 (TIFF Exploit 2.00): PSP <= 2.00 === | ||
Discovered | Discovered on 2005-09-23 by Niacin and Skylark. | ||
The exploit involves using a wallpaper and a TIFF image file containing a buffer overflow. Since the data from the wallpaper is in a known location (VRAM), one can use the TIFF overflow to jump to the known VRAM location and execute userode code. | |||
Implemented in downgraders (like MPH downgrader to 1.50) and eLoader by Fanjita. | |||
https://en.wikibooks.org/wiki/PSP/Homebrew_History#The_TIFF_Exploit | |||
=== libtiff exploit #2 (TIFF Exploit 2.71): PSP <= 2.71 === | |||
Discovered in 2006-09. | |||
Implemented in Kriek eLoader and xLoader by Team N00bz. | |||
https:// | https://en.wikibooks.org/wiki/PSP/Homebrew_History#The_TIFF_Exploit | ||
== | === libtiff exploit #3 (TIFF Exploit 4.20) by wololo: PSP <= 4.20 === | ||
Discovered in 2008-08. Released on 2009-03-15. | |||
https://wololo.net/2009/03/15/so-what-about-the-libtiff-vulnerability/ | |||
https:// | https://www.youtube.com/watch?v=RUJnXADjxsw | ||
https://web.archive.org/web/20111226013924/http://secunia.com/advisories/31610/ | |||
https:// | |||
=== libtiff exploit #4 (eggsploit) by Malloxis, Matiaz and davee: PSP <= 5.05 === | === libtiff exploit #4 (eggsploit) by Malloxis, Matiaz and davee: PSP <= 5.05 === | ||
Line 591: | Line 397: | ||
https://www.youtube.com/watch?v=wV21QqQmX_o | https://www.youtube.com/watch?v=wV21QqQmX_o | ||
=== Unsigned System PRX allowed: PSP <= 6.20 === | === Unsigned System PRX allowed: PSP <= 6.20 === | ||
Line 634: | Line 408: | ||
Fixed: since PSP System Software version 6.30. | Fixed: since PSP System Software version 6.30. | ||
=== Old System PRX allowed | === Old System PRX allowed === | ||
Discovered around 2005. | Discovered around 2005. | ||
Line 656: | Line 430: | ||
Fixed: no. | Fixed: no. | ||
=== | === POPS memory card manager buffer overflow exploit by qwikrazor87 and Acid_snake === | ||
There is a buffer overflow vulnerability in POPS (PSP's PS1emu) memory card manager that potentially affects any PS1 game. One can overflow it with any PS1 game's name. qwikrazor87 and Acid_snake never went with this vulnerability as they were looking for an exploit compatible with PS Vita at the time. | |||
This vulnerability only affects PSP's PS1emu memory card manager, not PS1, PS2, PS3 or PS4' PS1emu memory card managers. | |||
= Kernel = | = Kernel = | ||
== UID planting Type Confusion | == kernel execution using encrypted UID planting Type Confusion kexploit by qwikrazor87 (Trinity, ARK-4): PS Vita <= 3.74 == | ||
https://theofficialflow.github.io/2019/06/18/trinity.html#type-confusion | https://theofficialflow.github.io/2019/06/18/trinity.html#type-confusion | ||
Line 697: | Line 448: | ||
It involves AES enc/dec (using sceChnnlsv buffer in kernel RAM for fake thread UID) for it to work with the sceKernelDeleteThread UID kexploit. | It involves AES enc/dec (using sceChnnlsv buffer in kernel RAM for fake thread UID) for it to work with the sceKernelDeleteThread UID kexploit. | ||
== | == kernel arbitrary read using sceNpCore_8AFAB4A0 double-fetch race condition kexploit by qwikrazor87 (Trinity, ARK-4): PS Vita <= 3.70 == | ||
https://theofficialflow.github.io/2019/06/18/trinity.html#double-fetch-race-condition | https://theofficialflow.github.io/2019/06/18/trinity.html#double-fetch-race-condition | ||
Line 736: | Line 456: | ||
https://github.com/PSP-Archive/ARK-4/blob/main/loader/live/kernel/kxploit/vita360/kxploit.c | https://github.com/PSP-Archive/ARK-4/blob/main/loader/live/kernel/kxploit/vita360/kxploit.c | ||
== VPL kexploit by qwikrazor87 or Total_Noob: PS Vita | == VPL kexploit by qwikrazor87 or Total_Noob: PS Vita 3.00-3.52 == | ||
[https://bitbucket.org/Acid_Snake/ark-4/src/master/kxploit/sceVpl/kxploit.c 3.00-3.35 from PROCFW] | [https://bitbucket.org/Acid_Snake/ark-4/src/master/kxploit/sceVpl/kxploit.c 3.00-3.35 from PROCFW] | ||
Line 742: | Line 462: | ||
https://bitbucket.org/Acid_Snake/ark-4/src/master/kxploit/vpl/kxploit.c 3.51-3.52 from TN-V] | https://bitbucket.org/Acid_Snake/ark-4/src/master/kxploit/vpl/kxploit.c 3.51-3.52 from TN-V] | ||
== | == sceKernelDeleteThread UID kexploit by qwikrazor87: PS Vita <= 3.50 == | ||
Discovered around | Discovered around 2014-10-20 by qwikrazor87. | ||
https://github.com/GuidoAlessandroMenichetti/kxploits/blob/master/(3.50)%20sceKernelDeleteThread/explanation.txt | |||
== _sceG729EncodeTermResource (free) kexploit by qwikrazor87 or Total_Noob: PS Vita <= 3.50 == | |||
Discovered around 2015-02-11. Released on 2015-04-18 by anonymous (probably qwikrazor87). | |||
https://bitbucket.org/Acid_Snake/ark-4/src/master/kxploit/sceG729/kxploit.c | https://bitbucket.org/Acid_Snake/ark-4/src/master/kxploit/sceG729/kxploit.c | ||
Line 752: | Line 476: | ||
https://pastebin.com/Sdz0XPRg | https://pastebin.com/Sdz0XPRg | ||
== | == sceVideocodec race condition kexploit by qwikrazor87: PS Vita 3.30-3.36 == | ||
https://github.com/GuidoAlessandroMenichetti/kxploits/blob/master/(3.36)%20sceVideocodecStop/explanation.txt | https://github.com/GuidoAlessandroMenichetti/kxploits/blob/master/(3.36)%20sceVideocodecStop/explanation.txt | ||
Line 778: | Line 482: | ||
https://bitbucket.org/Acid_Snake/ark-4/src/master/kxploit/sceVideocodec/kxploit.c | https://bitbucket.org/Acid_Snake/ark-4/src/master/kxploit/sceVideocodec/kxploit.c | ||
== _sceSdGetLastIndex | == _sceSdGetLastIndex kexploit by qwikrazor87 (TN-X, TN-V): PS Vita 3.18-3.20 == | ||
Discovered around | Discovered around 2014-04-05 by qwikrazor87. | ||
There is a time-of-check to time-of-use exploit in chnnlsv. | There is a time-of-check to time-of-use exploit in chnnlsv. | ||
Line 798: | Line 502: | ||
https://github.com/PSP-Archive/ARK-4/blob/main/loader/live/kernel/kxploit/vita320/kxploit.c | https://github.com/PSP-Archive/ARK-4/blob/main/loader/live/kernel/kxploit/vita320/kxploit.c | ||
== | == _sceLoadCertFromFlash kexploit by Total_Noob (TN-V): PS Vita <= ?3.15? == | ||
Discovered around 2013-10-22. | |||
Discovered around 2013-10-22 | |||
https://github.com/GuidoAlessandroMenichetti/TN-Rev/blob/master/loader/main.c | https://github.com/GuidoAlessandroMenichetti/TN-Rev/blob/master/loader/main.c | ||
Line 818: | Line 512: | ||
https://bitbucket.org/Acid_Snake/ark-4/src/master/kxploit/sceLoadCertFromFlash/kxploit.c | https://bitbucket.org/Acid_Snake/ark-4/src/master/kxploit/sceLoadCertFromFlash/kxploit.c | ||
== sceRegRemoveCategory buffer overflow kexploit by Freddy_156 and some1: PS Vita <= ?2.11? == | == sceRegRemoveCategory buffer overflow kexploit by Freddy_156 and some1 (no implementation): PS Vita <= ?2.11? == | ||
Dicovered in 2011 by Freddy_156 and some1. Released on 2013-06-02 by Freddy_156. | Dicovered in 2011 by Freddy_156 and some1. Released on 2013-06-02 by Freddy_156. | ||
Line 865: | Line 559: | ||
== kermit_inet_socket kexploit by yosh, TheCobra and Frostegater (ARK, TN-A, TN-C): PS Vita <= 2.01 == | == kermit_inet_socket kexploit by yosh, TheCobra and Frostegater (ARK, TN-A, TN-C): PS Vita <= 2.01 == | ||
Discovered by yosh, TheCobra and Frostegater in 2012. Released on 2013-01-12 by yosh. | Discovered by yosh, Total_Noob, TheCobra and Frostegater in 2012. Released on 2013-01-12 by yosh. | ||
kermit_inet_socket (sceWlanDrv_lib_51B0BBB8) does not require an active WiFi connection. | kermit_inet_socket (sceWlanDrv_lib_51B0BBB8) does not require an active WiFi connection. | ||
Line 877: | Line 571: | ||
== sceWlanGetEtherAddr kexploit by yosh, TheCobra and Frostegater (VHBL, ARK): PS Vita 1.61-1.80 == | == sceWlanGetEtherAddr kexploit by yosh, TheCobra and Frostegater (VHBL, ARK): PS Vita 1.61-1.80 == | ||
Discovered by Yosh, TheCobra and Frostegater in 2012-07. Released (leaked) on 2012-11-01 by anonymous. | Discovered by Yosh, Total_Noob, TheCobra and Frostegater in 2012-07. Released (leaked) on 2012-11-01 by anonymous. | ||
In PSP System Software 6.60 sceWlanGetEtherAddr function is k1-checked but in PS Vita System Software <= 1.80 PSPemu it is not. | In PSP System Software 6.60 sceWlanGetEtherAddr function is k1-checked but in PS Vita System Software <= 1.80 PSPemu it is not. | ||
Line 913: | Line 607: | ||
TBD: implementation by CelesteBlue | TBD: implementation by CelesteBlue | ||
== sceNetMPulldown ( | == sceNetMPulldown (also called ifhandle 6.60-6.61) kexploit by davee (PROCFW, ME, Chronoswitch, Infinity 2): PSP <= 6.61 == | ||
https://github.com/uofw/uofwinst/blob/master/PXE/Launcher/kxp_660.c | https://github.com/uofw/uofwinst/blob/master/PXE/Launcher/kxp_660.c | ||
Line 947: | Line 641: | ||
https://wololo.net/2013/05/04/kernel-exploits-how-they-work-and-why-they-are-scarce/ | https://wololo.net/2013/05/04/kernel-exploits-how-they-work-and-why-they-are-scarce/ | ||
== | == ifhandle 5.70 race condition kexploit by davee: PSP 5.00-5.70, patched on PSP 6.20 == | ||
https://wololo.net/talk/viewtopic.php?p=147730#p147730 | https://wololo.net/talk/viewtopic.php?p=147730#p147730 | ||
Line 953: | Line 647: | ||
https://wololo.net/talk/viewtopic.php?p=147732#p147732 | https://wololo.net/talk/viewtopic.php?p=147732#p147732 | ||
== GEN/M33 contested | == GEN/M33 contested wlan exploit: PSP <= 5.50 == | ||
?? Ask davee. | |||
https://wololo.net/talk/viewtopic.php?p=147642#p147642 | https://wololo.net/talk/viewtopic.php?p=147642#p147642 | ||
Line 970: | Line 664: | ||
http://www.kingx.de/forum/showthread.php?tid=15275 | http://www.kingx.de/forum/showthread.php?tid=15275 | ||
This exploit clobbers 16 bytes of kernel memory, so it is needed to read kernel memory before exploiting and restore the other 12 after. | This exploit clobbers 16 bytes of kernel memory, so it is needed to read kernel memory before exploiting and restore the other 12 after. | ||
Line 998: | Line 690: | ||
https://www.hitchhikr.net/Exploit_2.6.zip | https://www.hitchhikr.net/Exploit_2.6.zip | ||
== reused index.dat key: PSP 2.00, 2.01 == | == reused index.dat key: PSP 2.00, 2.01 == | ||
Line 1,027: | Line 715: | ||
Fixed: since PSP System Software version 6.35. | Fixed: since PSP System Software version 6.35. | ||
= iplloader = | = Lib-PSP iplloader = | ||
== NMI Backdoor == | == NMI Backdoor == | ||
Line 1,039: | Line 727: | ||
Applicable to: None | Applicable to: None | ||
Vulnerable: iplloader (all | Vulnerable: Lib-PSP iplloader (all bootrom versions, 0.7.0 and newer Kbooti versions, PS Vita's PSP emulator bootrom) | ||
The iplloader bootrom (present within Tachyon's IC package) as well as iplloader versions 0.7.0 and onward feature a NMI/Interrupt handler backdoor (most likely used internally for debugging purposes) in its loader part at the very first instructions of the bootrom. | The Lib-PSP iplloader bootrom (present within Tachyon's IC package) as well as Lib-PSP iplloader versions 0.7.0 and onward feature a NMI/Interrupt handler backdoor (most likely used internally for debugging purposes) in its loader part at the very first instructions of the bootrom. | ||
This backdoor allows anyone in control of the memory location address 0xBC100000 to perform a jump to an arbitrary location defined in coprocessor register $9 | This backdoor allows anyone in control of the memory location address 0xBC100000 to perform a jump to an arbitrary location defined in coprocessor register $9 | ||
If value at address 0xBC100000 is not equal to 0 and coprocessor register $9 is set, iplloader will jump to the address set in the register very early in the code (by the 8th instruction). Else (if value at address 0xBC100000 is equal to 0), coprocessor register $9 will be reset back to 0. | If value at address 0xBC100000 is not equal to 0 and coprocessor register $9 is set, Lib-PSP iplloader will jump to the address set in the register very early in the code (by the 8th instruction). Else (if value at address 0xBC100000 is equal to 0), coprocessor register $9 will be reset back to 0. | ||
Below are the relevant pieces of code: | Below are the relevant pieces of code: | ||
Line 1,060: | Line 748: | ||
</pre> | </pre> | ||
This backdoor may allow an attacker performing a hardware based attack to set those values and gain iplloader time code execution. | This backdoor may allow an attacker performing a hardware based attack to set those values and gain Lib-PSP iplloader time code execution. | ||
== Arbitrary IPL Load Address == | == Arbitrary IPL Load Address == | ||
Line 1,072: | Line 760: | ||
Fixed: Partially in Tachyon 0x00600000. The CPU scratchpad (0xA0010000 uncached; 0x80010000 cached) range is now blacklisted, whilst all other addresses remain allowed. | Fixed: Partially in Tachyon 0x00600000. The CPU scratchpad (0xA0010000 uncached; 0x80010000 cached) range is now blacklisted, whilst all other addresses remain allowed. | ||
iplloader will not control the location at which it will load/copy the block. It will happily attempt to perform a memcpy (at a rate of 1 DWORD per cycle) to whatever load address is specified in the IPL header, assuming that the header passes the checks (Kirk cmd 1, Kirk cmd 1 ECDSA, Kirk cmd 0x6C SHA1 (on Tachyon 0x00600000 and later), ...). This allows to write a payload at arbitrary locations. | Lib-PSP iplloader will not control the location at which it will load/copy the block. It will happily attempt to perform a memcpy (at a rate of 1 DWORD per cycle) to whatever load address is specified in the IPL header, assuming that the header passes the checks (Kirk cmd 1, Kirk cmd 1 ECDSA, Kirk cmd 0x6C SHA1 (on Tachyon 0x00600000 and later), ...). This allows to write a payload at arbitrary locations. | ||
== Arbitrary IPL Entrypoint Address == | == Arbitrary IPL Entrypoint Address == | ||
Line 1,082: | Line 770: | ||
Applicable to: IPL time code execution on 01g and 02g, used in Pandora | Applicable to: IPL time code execution on 01g and 02g, used in Pandora | ||
Fixed: iplloader 2.6.0 | Fixed: Lib-PSP iplloader 2.6.0 | ||
iplloader will jump to any location specified in the last IPL block's entrypoint. This allows arbitrary execution. This was used in conjunction with the Kirk time-attack to craft a block and gain execution from at address 0xBFD00100 in the Pandora hack, and thus allowed to craft a "valid" block in a more timely fashion. | Lib-PSP iplloader will jump to any location specified in the last IPL block's entrypoint. This allows arbitrary execution. This was used in conjunction with the Kirk time-attack to craft a block and gain execution from at address 0xBFD00100 in the Pandora hack, and thus allowed to craft a "valid" block in a more timely fashion. | ||
Note: The vulnerability is also present on Tachyon 0x00600000 and later, but cannot be exploited by itself due to an ECDSA signature (Kirk cmd 17) check. | Note: The vulnerability is also present on Tachyon 0x00600000 and later, but cannot be exploited by itself due to an ECDSA signature (Kirk cmd 17) check. | ||
Line 1,100: | Line 788: | ||
Fixed: Tachyon 0x00600000. Bootrom now requires a minimum IPL block size of 0x100. | Fixed: Tachyon 0x00600000. Bootrom now requires a minimum IPL block size of 0x100. | ||
iplloader will not control the block size. This allows to craft a small, favorable for time-attack, IPL block. | Lib-PSP iplloader will not control the block size. This allows to craft a small, favorable for time-attack, IPL block. | ||
https://web.archive.org/web/20100409005536/http://my.malloc.us/silverspring/pandora-exploit/ | https://web.archive.org/web/20100409005536/http://my.malloc.us/silverspring/pandora-exploit/ | ||
== iplloader assumes a block with the checksum 0 is the first IPL block == | == Lib-PSP iplloader assumes a block with the checksum 0 is the first IPL block == | ||
Found by: C+D/Prometheus - Earliest discovery: 2006 Q4 | Found by: C+D/Prometheus - Earliest discovery: 2006 Q4 | ||
Line 1,114: | Line 802: | ||
Fixed: indirectly since Tachyon 0x00600000 as no IPL that run on Tachyon 0x00600000 and onwards have a block that uses a previous block checksum of 0 other than block #0 itself. | Fixed: indirectly since Tachyon 0x00600000 as no IPL that run on Tachyon 0x00600000 and onwards have a block that uses a previous block checksum of 0 other than block #0 itself. | ||
This implementation fault has been exploited to create a memory hole in VRAM that could be filled with our own payload to gain execution and dump iplloader. | This implementation fault has been exploited to create a memory hole in VRAM that could be filled with our own payload to gain execution and dump Lib-PSP iplloader. | ||
== iplloader do not perform the XOR step when running in Jig/Service mode == | == Lib-PSP iplloader do not perform the XOR step when running in Jig/Service mode == | ||
Found by: Mathieulh - Earliest discovery: 2019 Q1 | Found by: Mathieulh - Earliest discovery: 2019 Q1 | ||
Introduced: iplloader 3.5.0 | Introduced: Lib-PSP iplloader 3.5.0 | ||
Applicable to: Code execution on 3.5.0 iplloader without previous knowledge of the XOR key. | Applicable to: Code execution on 3.5.0 Lib-PSP iplloader without previous knowledge of the XOR key. | ||
Fixed: probably never as 3.5.0 is the last known iplloader revision for Development Tool | Fixed: probably never as 3.5.0 is the last known Lib-PSP iplloader revision for Development Tool | ||
This is not so much a vulnerability as a poor design implementation. | This is not so much a vulnerability as a poor design implementation. | ||
To allow service centers to use a unique Memory Stick for multiple PSP models during servicing, iplloader deliberately disables the XOR step, allowing a non XORed IPL to run from Memory Stick. This is done so that the IPL can run on all systems from 01g to 11g. This is also presumably done because XOR keys may differ in between Tachyon revisions. | To allow service centers to use a unique Memory Stick for multiple PSP models during servicing, Lib-PSP iplloader deliberately disables the XOR step, allowing a non XORed IPL to run from Memory Stick. This is done so that the IPL can run on all systems from 01g to 11g. This is also presumably done because XOR keys may differ in between Tachyon revisions. | ||
This allows a potential attacker with the ability to enable Jig mode on a targeted PSP to bypass the XOR step and thus not requiring to know the XOR key to gain execution at IPL time assuming that all other checks (Kirk cmd 1, Kirk cmd 1 ECDSA, Kirk cmd 0x6C SHA1 (on Tachyon 0x00600000 and later), ...) are passed. | This allows a potential attacker with the ability to enable Jig mode on a targeted PSP to bypass the XOR step and thus not requiring to know the XOR key to gain execution at IPL time assuming that all other checks (Kirk cmd 1, Kirk cmd 1 ECDSA, Kirk cmd 0x6C SHA1 (on Tachyon 0x00600000 and later), ...) are passed. | ||
== iplloader clears the XOR key after doing a cache sync during normal execution == | == Lib-PSP iplloader clears the XOR key after doing a cache sync during normal execution == | ||
Found by: Proxima - Earliest discovery: 2020-01-27 | Found by: Proxima - Earliest discovery: 2020-01-27 | ||
Introduced: iplloader 3.5.0 | Introduced: Lib-PSP iplloader 3.5.0 | ||
Applicable to: Dumping the iplloader 3.5.0 XOR key from Jig mode execution when used in conjunction with the arbitrary load address vulnerability | Applicable to: Dumping the Lib-PSP iplloader 3.5.0 XOR key from Jig mode execution when used in conjunction with the arbitrary load address vulnerability | ||
Fixed: probably never as 3.5.0 is the last known iplloader revision for Development Tool | Fixed: probably never as 3.5.0 is the last known Lib-PSP iplloader revision for Development Tool | ||
3.5.0 iplloader clears the XOR key after doing a cache sync during normal execution. This allows to retrieve the key from the uncached memory at address 0xA001088C. | 3.5.0 Lib-PSP iplloader clears the XOR key after doing a cache sync during normal execution. This allows to retrieve the key from the uncached memory at address 0xA001088C. | ||
In Jig mode execution, the key is cleared much earlier, however resulting in the cache being synced once the key is already gone. This allows to easily retrieve the key using a XORed IPL block loaded at address 0xBFE01000. | In Jig mode execution, the key is cleared much earlier, however resulting in the cache being synced once the key is already gone. This allows to easily retrieve the key using a XORed IPL block loaded at address 0xBFE01000. | ||
While it may be possible that Tachyon 0x00600000 and later iplloader fix this issue, it is irrelevant because the code should remain accessible as part of the Tachyon bootrom at address 0xBFC00000) | While it may be possible that Tachyon 0x00600000 and later Lib-PSP iplloader fix this issue, it is irrelevant because the code should remain accessible as part of the Tachyon bootrom at address 0xBFC00000) | ||
== Faulty ECDSA Hash Comparison == | == Faulty ECDSA Hash Comparison == | ||
Line 1,158: | Line 846: | ||
Fixed: never | Fixed: never | ||
Starting with Tachyon 0x00600000, iplloader XORs each IPL block hash as they are loaded, and then uses this final XOR to verify the signature. | Starting with Tachyon 0x00600000, Lib-PSP iplloader XORs each IPL block hash as they are loaded, and then uses this final XOR to verify the signature. | ||
This means that inserting two identical blocks in the chain will cancel the XOR change and the signature will remain valid. | This means that inserting two identical blocks in the chain will cancel the XOR change and the signature will remain valid. | ||
Line 1,165: | Line 853: | ||
= General writeups = | = General writeups = | ||
https://wololo.net/2014/01/18/10-days-of-hacking-day-4-the-psp-part-1/ | https://wololo.net/2014/01/18/10-days-of-hacking-day-4-the-psp-part-1/ | ||
Line 1,175: | Line 861: | ||
https://github.com/BASLQC/BASLQC/wiki/PSP-Custom-Firmware-History#History_of_homebrew_on_PSP | https://github.com/BASLQC/BASLQC/wiki/PSP-Custom-Firmware-History#History_of_homebrew_on_PSP | ||