DSi system flaws: Difference between revisions
Linked to source for overlay checking flaw |
No edit summary |
||
| Line 48: | Line 48: | ||
|- | |- | ||
| [[Stage2]] header RSA signature padding not checked properly | | [[Stage2]] header RSA signature padding not checked properly | ||
| [[Stage1]] uses the SWI RSA_Decrypt_Unpad routine to verify the RSA signature of the [[stage2]] header. However, it does not check the return value of this function. This will make stage1 use | | [[Stage1]] uses the SWI RSA_Decrypt_Unpad routine to verify the RSA signature of the [[stage2]] header. However, it does not check the return value of this function. This will make stage1 use uninitialized memory as the plaintext RSA message for signatures with improper padding. Normally, this memory is all-zeros, and due to the specific structure of this RSA message, this will quickly be caught by stage1. However, given that GCD private keys have been leaked (see below), it is in theory possible to use a signature from a gamecart to boot from [NAND] or [NVRAM]. | ||
| | | | ||
| | | | ||
| 2022 | | 2022 / 2024? | ||
| | | November 2023 / February 1st, 2026 | ||
| {{User|PoroCYon}} | | Originally {{User|PoroCYon}} / TuxSH for the implications of the GCD private keys being known. | ||
|- | |- | ||
| [[stage1]] hash verification code is vulnerable to fault injection | | [[stage1]] hash verification code is vulnerable to fault injection | ||
| The [[stage1]] code that verifies the first two SHA1 hashes in the RSA signature appendix (the header hash and the "hash of hashes" redundancy hash) is constructed in such a way that they can be both bypassed with a single injected fault. This makes it possible to exploit both bootroms using | | The [[stage1]] code that verifies the first two SHA1 hashes in the RSA signature appendix (the header hash and the "hash of hashes" redundancy hash) is constructed in such a way that they can be both bypassed with a single injected fault. This makes it possible to exploit both bootroms using a modchip | ||
| | | | ||
| | | | ||
| 2022 | | 2022 | ||
| nov/dec 2023, see [https://media.ccc.de/v/37c3-11736-nintendo_hacking_2023_2008 37c3 talk] | | nov/dec 2023, see [https://media.ccc.de/v/37c3-11736-nintendo_hacking_2023_2008 37c3 talk] | ||
|- | |||
| Gamecart (GCD) boot private keys included in Gigaleaks | |||
| With private keys you can generate valid RSA signatures, and thus use an "ntrboot-style" flashcart to gain code execution without any real exploit. | |||
| | |||
| | |||
| Dec 2023/Jan 2024 | |||
| July 2024 | |||
| asie? | |||
|} | |} | ||