Changes

88 bytes added ,  00:37, 17 March 2010
Line 13: Line 13:  
== Exploits ==
 
== Exploits ==
   −
DS Station's web browser uses NetFront 3.3. This browser version has stack smash bugs in basically all functions handling tag fields with variable values.(URLs, etc.)
+
DS Station's web browser uses NetFront 3.3. This browser version has a stack smash bug in a function writing the URL from a tag field's value to the stack. This bug is present in at least one function, it's unknown if other functions have this bug as well.
It is currently unknown if Nintendo Zone uses a newer NetFront version with these bugs fixed. A Nintendo Zone exploit couldn't be easily used by everyone, as Linux and a compatible hostapd wireless NIC is required. An SSID, and the WEP key generated from the SSID, from a real Nintendo Zone/DS Station AP is required.
+
It is currently unknown if Nintendo Zone uses a newer NetFront version with this bug fixed. A Nintendo Zone exploit couldn't be easily used by everyone, as Linux and a compatible hostapd wireless NIC is required. An SSID, and the WEP key generated from the SSID, from a real Nintendo Zone/DS Station AP is required.
 
At real Nintendo Zone APs, a laptop running Linux with a wireless NIC supporting monitor mode would be needed.
 
At real Nintendo Zone APs, a laptop running Linux with a wireless NIC supporting monitor mode would be needed.
 
This exploit would be meant more for reverse engineers. A DS Station exploit has been written by Yellows8. This DS Station exploit can't be adapted to Nintendo Zone until an Nintendo Zone AP capture and Nintendo Zone binary are obtained. A volunteer to capture Nintendo Zone AP traffic and the WMB binary was found a long while ago, but it is unknown when he'll capture. Perhaps sometime this month(March), but it's unknown. This exploit can only be used with html that is transferred over http. The html for the index main and sub screens is transferred over https. However, the html for the main screen for the pages after the index,(main server and third-party companies websites) is transferred with http. The sub screen html is transferred with https, with the main server. Sub screen html with third-party companies is transferred with http. Strangely, the back link from the menu after the index page for the main server, the main screen html URL uses http, rather than https.
 
This exploit would be meant more for reverse engineers. A DS Station exploit has been written by Yellows8. This DS Station exploit can't be adapted to Nintendo Zone until an Nintendo Zone AP capture and Nintendo Zone binary are obtained. A volunteer to capture Nintendo Zone AP traffic and the WMB binary was found a long while ago, but it is unknown when he'll capture. Perhaps sometime this month(March), but it's unknown. This exploit can only be used with html that is transferred over http. The html for the index main and sub screens is transferred over https. However, the html for the main screen for the pages after the index,(main server and third-party companies websites) is transferred with http. The sub screen html is transferred with https, with the main server. Sub screen html with third-party companies is transferred with http. Strangely, the back link from the menu after the index page for the main server, the main screen html URL uses http, rather than https.