Changes

987 bytes added ,  00:34, 2 January 2024
Line 45: Line 45:  
| 2022
 
| 2022
 
| December 19, 2022
 
| December 19, 2022
| {{User|Yellows8}}
+
| {{User|Yellows8}}, {{User|PoroCYon}}
 +
|-
 +
| [[Stage2]] header RSA signature padding not checked properly
 +
| [[Stage1]] uses the SWI RSA_Decrypt_Unpad routine to verify the RSA signature of the [[stage2]] header. However, it does not check the return value of this function. This will make stage1 use zero-initialized memory as the plaintext RSA message for signatures with improper padding. However, due to the specific structure of this RSA message, this will quickly be caught by stage1.
 +
|
 +
|
 +
| 2022
 +
|
 +
| {{User|PoroCYon}}
 +
|-
 +
| [[stage1]] hash verification code is vulnerable to fault injection
 +
| The [[stage1]] code that verifies the first two SHA1 hashes in the RSA signature appendix (the header hash and the "hash of hashes" redundancy hash) is constructed in such a way that they can be both bypassed with a single injected fault. This makes it possible to exploit both bootroms using a a modchip
 +
|
 +
|
 +
| 2022
 +
| nov/dec 2023, see [https://media.ccc.de/v/37c3-11736-nintendo_hacking_2023_2008 37c3 talk]
 
|}
 
|}
   Line 92: Line 107:     
== Applications ==
 
== Applications ==
Flaws in this category pertain to applications launched by [[System Menu]]. See also [[DSi_exploits]].
+
Flaws in this category pertain to applications launched by [[System Menu]]. See also [[DSi exploits]].
76

edits