Line 216: |
Line 216: |
| |- | | |- |
| | ntrcardhax | | | ntrcardhax |
− | | | + | | When reading the banner of a NTR title, Process9 relies on a hardware register to know when the banner was fully read. |
| + | However that register is shared between the ARM9 and the ARM11. |
| + | An attacker with k11 control can so make Process9 believe the banner continues forever and so trigger a buffer overflow. |
| + | With a custom banner for a NTR flashcart, this leads to code execution in Process9. |
| + | |
| + | This was fixed by adding bound checks on the read data. |
| | ARM9 code execution | | | ARM9 code execution |
− | | 10.4.0-29 | + | | [[10.4.0-29|10.4.0-X]] |
| | | | | |
| | March 2015 | | | March 2015 |