Line 45:
Line 45:
| 2022
| 2022
| December 19, 2022
| December 19, 2022
−
| {{User|Yellows8}}
+
| {{User|Yellows8}}, {{User|PoroCYon}}
+
|-
+
| [[Stage2]] header RSA signature padding not checked properly
+
| [[Stage1]] uses the SWI RSA_Decrypt_Unpad routine to verify the RSA signature of the [[stage2]] header. However, it does not check the return value of this function. This will make stage1 use zero-initialized memory as the plaintext RSA message for signatures with improper padding. However, due to the specific structure of this RSA message, this will quickly be caught by stage1.
+
|
+
|
+
| 2022
+
|
+
| {{User|PoroCYon}}
+
|-
+
| [[stage1]] hash verification code is vulnerable to fault injection
+
| The [[stage1]] code that verifies the first two SHA1 hashes in the RSA signature appendix (the header hash and the "hash of hashes" redundancy hash) is constructed in such a way that they can be both bypassed with a single injected fault. This makes it possible to exploit both bootroms using a a modchip
+
|
+
|
+
| 2022
+
| nov/dec 2023, see [https://media.ccc.de/v/37c3-11736-nintendo_hacking_2023_2008 37c3 talk]
|}
|}
Line 92:
Line 107:
== Applications ==
== Applications ==
−
Flaws in this category pertain to applications launched by [[System Menu]]. See also [[DSi_exploits]].
+
Flaws in this category pertain to applications launched by [[System Menu]]. See also [[DSi exploits]].