Bugs & Vulnerabilities

From PS4 Developer wiki
Revision as of 19:50, 7 March 2014 by Cfwprophet (talk | contribs) (→‎Reference sites)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Vidnow (TCP Buffer Overflow)

When you launch Vidnow for the first time it gets http://sceecatalogs.vidzone.tv/386/vidzone_386_US.db.psarc. This file is 5mb. This file loads into a 60k tcp buffer. No checks are done at all on the files size/hash/contents. Therefore, it is possible to redirect Vidnow to load a substitute file. When vidnow is redirected to load a large enough file the TCP Window buffer is overrun,somewhere between byte 34,125,000 and 35,000,000 of the substitute file. Despite the buffer overflow and crash, the substitute data is still transmitted and the application only throws the exception when another tcp packet is sent. As a result, the application crashes and the console locks up for a minute. Directly before the console resumes normal operations after the crash, an unusually large number of tcp (RST) packets are sent. While no exploit that makes use of this crash is currently available, a carefully crafted file may be able to exploit this or similar issues to gain code execution, among other things.

Crash Timeline-

17:17:39.899984000 Request

17:17:40.000655000 Request

17:17:40 (System locks up) Crash

17:17:44.957274000 Repsonse

17:17:48.500481000 Response

17:17:48.500567000 Response

17:17:50.356427000 (System no longer locked up) Console Regains Control (74 byte packet sent)

17:17:50.357555000 Contacts Crashlog Server/System Operation Resumes

Reference sites