Changes

285 bytes added ,  21:02, 6 March 2010
Line 14: Line 14:     
DS Station's web browser uses NetFront 3.3. This browser version has stack smash bugs in basically all functions handling tag fields with variable values.(URLs, etc.)
 
DS Station's web browser uses NetFront 3.3. This browser version has stack smash bugs in basically all functions handling tag fields with variable values.(URLs, etc.)
It is currently unknown if Nintendo Zone uses a newer NetFront version with these bugs fixed. A Nintendo Zone exploit couldn't be easily used by everyone, as Linux and a compatible hostapd wireless NIC is required.
+
It is currently unknown if Nintendo Zone uses a newer NetFront version with these bugs fixed. A Nintendo Zone exploit couldn't be easily used by everyone, as Linux and a compatible hostapd wireless NIC is required. An SSID, and the WEP key generated from the SSID, from a real Nintendo Zone/DS Station AP is required.
 
At real Nintendo Zone APs, a laptop running Linux with a wireless NIC supporting monitor mode would be needed.
 
At real Nintendo Zone APs, a laptop running Linux with a wireless NIC supporting monitor mode would be needed.
This exploit would be meant more for reverse engineers.
+
This exploit would be meant more for reverse engineers. A DS Station exploit has been written by Yellows8. This DS Station exploit can't be adapted to Nintendo Zone until an Nintendo Zone AP capture and Nintendo Zone binary are obtained.
    
== Technical information ==
 
== Technical information ==
    
More technical information is available [http://code.google.com/p/wmb-asm/wiki/NintendoSpot here.]
 
More technical information is available [http://code.google.com/p/wmb-asm/wiki/NintendoSpot here.]