By entering this site you need to consent to the use of cookies and their functional use according to this privacy policy. Cookies help us to provide the functional services of the website. Kindly read the below message of use and consent to the use.
The following cookies are stored and shared when accessing this website:
- Internal cookies for the MediaWiki site. This is used for user authentication and article modifications.
- Third-party cookies from Google providing services for Google AdSense and Google Analytics
We will never use data collected outside of the above scope.
Added exploits section. DS Station has stack smash bugs, unknown if Nintendo Zone has these bugs.
Line 9:
Line 9:
== Versions ==
== Versions ==
−
The v2.0 of the DSi Nintendo Zone client was released with the February 9, 2010 update. The Japanese client was updated to v2.0 on January 8, 2010. It is unknown what has changed.
+
Version 3.0 of DSi Nintendo Zone client was released with the February 9, 2010 update. The Japanese client was updated to v3.0 on January 8, 2010. It is unknown what has changed.
+
+
== Exploits ==
+
+
DS Station's web browser uses NetFront 3.3. This browser version has stack smash bugs in basically all functions handling tag fields with variable values.(URLs, etc.)
+
It is currently unknown if Nintendo Zone uses a newer NetFront version with these bugs fixed. A Nintendo Zone exploit couldn't be easily used by everyone, as Linux and a compatible hostapd wireless NIC is required.
+
At real Nintendo Zone APs, a laptop running Linux with a wireless NIC supporting monitor mode would be needed.
+
This exploit would be meant more for reverse engineers.
== Technical information ==
== Technical information ==
More technical information is available [http://code.google.com/p/wmb-asm/wiki/NintendoSpot here.]
More technical information is available [http://code.google.com/p/wmb-asm/wiki/NintendoSpot here.]