Difference between revisions of "3DS Userland Flaws"
m (Fixing a table) |
(→Non-system applications: might as well finally document this CGB trl vuln. may the 3DS VC escape become reality someday.) |
||
(76 intermediate revisions by 21 users not shown) | |||
Line 39: | Line 39: | ||
| Buffer overflow in local-multiplayer beacon handling. | | Buffer overflow in local-multiplayer beacon handling. | ||
| See [[smashbroshax|here]]. | | See [[smashbroshax|here]]. | ||
− | | | + | | App: v1.1.3 |
| See [[smashbroshax|here]]. System: [[10.3.0-28]]. | | See [[smashbroshax|here]]. System: [[10.3.0-28]]. | ||
| Time of exploit release. | | Time of exploit release. | ||
| See [[smashbroshax|here]]. | | See [[smashbroshax|here]]. | ||
| [[User:Yellows8|Yellows8]] | | [[User:Yellows8|Yellows8]] | ||
+ | |- | ||
+ | | Pokemon Super Mystery Dungeon | ||
+ | | Heap overflow within linear memory via unchecked save file length | ||
+ | | Pokemon Super Mystery Dungeon uses zlib compression for most of its save files, possibly due to the save files being larger than its predecessor, Gates to Infinity. When a save file is being prepared to be loaded and read from, only a 0x32000 large buffer is allocated for file reading, and a 0x3e800-large buffer for decompression is also allocated before the file is read. However, the game does not limit the size of the file read to this allocation bound, allowing for the file to overflow into the linear memory heap and into the next allocation. Since Pokemon Super Mystery Dungeon stores allocation memchunks directly before the allocation, overwriting the next memchunk with a corrupted one allows for arbitrary writes of linear heap pointers when the next buffer is allocated or arbitrary writes of any pointer within writable memory when the corrupted buffer is freed. | ||
+ | | None | ||
+ | | O3DS: [[11.3.0-36]]. N3DS: [[11.4.0-37]]. | ||
+ | | Time of exploit release. | ||
+ | | April 14, 2016 | ||
+ | | [[User:Shinyquagsire23|Shiny Quagsire]] | ||
+ | |- | ||
+ | | VVVVVV | ||
+ | | Buffer overflow in XML save file array parsing | ||
+ | | VVVVVV utilizes several XML files (renamed with a .vvv extension) to store level save data, stats and settings. Within these XML files are several tags containing an array of data which, when parsed, is not properly checked to be of proper length for the tag being parsed from. This allows for an overflow of 16-bit array values from the location where the array is parsed. With unlock.vvv, XML data is parsed to the stack, and with level saves the heap. This allows for the pointer where the level save worldmap tag array should be parsed into to be overwritten with a stack address, allowing for ROP from within the XML array parsing function on the next level load. | ||
+ | | App: v1.1 | ||
+ | | [[10.7.0-32]]. | ||
+ | | Time of exploit release. | ||
+ | | April 25, 2016 | ||
+ | | [[User:Shinyquagsire23|Shiny Quagsire]] | ||
+ | |- | ||
+ | | Citizens of Earth | ||
+ | | Save file read stack smash | ||
+ | | Citizens of Earth also uses "XML" files for saves, which are actually entirely binary data (not XML at all) with no checksums. These files are read from the filesystem on to a fixed size stack buffer which leads to an incredibly trivial stack smash. When using the autosave slot for this, the save is parsed when the user selects "continue". When using one of the dedicated save slots (1-3), the save is parsed shortly after the company splash screens fade. Note that the save is read quite high (descending) on the stack - when exploiting this, one would likely need to move SP due to almost instantly overflowing the physical stack. | ||
+ | | None | ||
+ | | [[10.7.0-32]]. | ||
+ | | Time of exploit release. | ||
+ | | May 5, 2016 | ||
+ | | [[User:Dazzozo|Dazzozo]] | ||
+ | |- | ||
+ | | SmileBASIC 3.x | ||
+ | | Poor parameter validation on "BGSCREEN" command | ||
+ | | The SmileBASIC "BGSCREEN" command's second parameter is not properly validated as being within range. As a result, one can set the screen size to an absurdly large value. This means that the "BGGET" and "BGPUT" commands can then be used on out-of-range values to read and write a significant chunk of the interpreter's address space. | ||
+ | With a series of carefully-designed BGPUT commands, one can build a ROP chain and cause it to be executed. | ||
+ | | App: 3.3.2. | ||
+ | | System: [[11.0.0-33]]. | ||
+ | | July 20, 2016 | ||
+ | | Around June 26, 2016 | ||
+ | | slackerSnail, 12Me12, incvoid | ||
+ | Exploited by MrNbaYoh and [[User:Plutooo|plutoo]]. | ||
+ | |- | ||
+ | | SmileBASIC 3.x | ||
+ | | Subscripted TIME$/DATE$ allow write access to DATA/BSS | ||
+ | | Utf-16 characters can be assigned to subscripted TIME$/DATE$ interpreter sysvars which results in write-only access to all of DATA and some BSS in userland. | ||
+ | TIME$[0]/DATE$[0] actually point to somewhere in rodata, and an overly large subscript can be used to write well past it and into the aforementioned areas. Demo [https://github.com/zoogie/smilehax-IIe here.] | ||
+ | | App: 3.6.2 (3.6.0 latest for US/EU, JP appvers. can be downgraded) | ||
+ | | System: [[11.13.0-45]]. | ||
+ | | April 2020 | ||
+ | | February 2020 | ||
+ | | bug publicly documented [https://translate.google.com/translate?sl=auto&tl=en&u=http%3A%2F%2Fsmilebasic.com%2Fdebug%2Farchive%2F here.] | ||
+ | Exploited by Zoogie | ||
+ | |- | ||
+ | | The Legend of Zelda: Tri Force Heroes | ||
+ | | [[3DS_System_Flaws#General.2FCTRSDK|CTRSDK]] CTPK buffer overflow combined with game's usage of SpotPass | ||
+ | | During the very first screen displayed by the game during boot("Loading..."), just seconds after title launch, the game loads CTPK from the [[BOSS_Services|stored]] SpotPass content. Hence, this game could be exploited via the vulnerable CTRSDK CTPK code ''if'' one could get custom SpotPass data into extdata somehow(ctr-httpwn >=v1.2 with bosshaxx allows this). | ||
+ | |||
+ | The code for this runs from a thread separate from the main-thread, with the stack in linearmem heap. This SpotPass handling triggers before the game ever opens the regular savedata archive. The extdata is opened at some point before this: it opens a file for checking if it exists, then immediately closes it. | ||
+ | |||
+ | The two SpotPass URLs for this have always(?) returned HTTP 404 as of November 2016. It appears these were intended for use as textures for additional costumes(and never got used publicly), but this wasn't tested. | ||
+ | |||
+ | This is used by [https://github.com/yellows8/ctpkpwn ctpkpwn_tfh]. | ||
+ | | None | ||
+ | | App: v2.1.0 | ||
+ | | November 18, 2016 | ||
+ | | November 14, 2016 | ||
+ | | [[User:Yellows8|Yellows8]] | ||
+ | |- | ||
+ | | Pixel Paint | ||
+ | | Buffer overflow via unchecked extdata file length | ||
+ | | Pixel Paint loads pictures saved by the user from extdatas. The file is read to a fixed size buffer but the file length remains unchecked, so with a large enough file, one can overwrite pointers in memory and gain control of the execution flow. | ||
+ | | None | ||
+ | | App: Initial version. System: [[11.2.0-35]]. | ||
+ | | December 27, 2016 | ||
+ | | November 5, 2016 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]] | ||
+ | |- | ||
+ | | Steel Diver : Sub Wars | ||
+ | | Heap overflow / arbitrary memcpy | ||
+ | | Savefile datas are stored as key/value pairs, a large enough string key makes the game overwrite a memcpy source/destination addresses and size arguments. So one can actually memcpy a rop on the stack and gain control of the execution flow. | ||
+ | | None | ||
+ | | System: [[11.2.0-35]]. | ||
+ | | December 27, 2016 | ||
+ | | Around July 15, 2016 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]], Vegaroxas | ||
+ | |- | ||
+ | | 1001 Spikes | ||
+ | | Buffer overflow via unchecked array-indexes in XML savefile parsing | ||
+ | | The savefiles are stored as renamed .xml files, which contain several tags with attributes like 'array-index="array-value"', where both of these are converted from ASCII strings to integers as signed-int32, and the array-value given blindly written to an array inside a structure using the (unchecked) index given. With several of these attributes, one can overwrite the stack starting from the stored lr of the function that does this parsing, and write a ROP chain there. Testing used the "LevelAttempts" tag which is the last such tag parsed in that function. | ||
+ | | None | ||
+ | | App: v1.2.0 (TMD v2096) | ||
+ | | December 27, 2016 | ||
+ | | Around November 2, 2016 | ||
+ | | [[User:Riley|Riley]] | ||
+ | |- | ||
+ | | Pokemon Omega Ruby/Alpha Sapphire | ||
+ | | Secret base team name heap overflow | ||
+ | | When the player wants to edit the team name, it is copied over the heap, however its length is not verified. So with a large enough team name one can overwrite some pointers and get two arbitrary jumps and then get control of the execution flow. | ||
+ | | None | ||
+ | | App: 1.4. System: [[11.2.0-35]]. | ||
+ | | December 30, 2016 | ||
+ | | June, 2016 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]] | ||
+ | |- | ||
+ | | Swapdoodle | ||
+ | | Heap buffer overflow via unchecked size | ||
+ | | The letter file format used by doodlebomb is composed of multiple chunks. Each chunks is described in the header of the file where the name, size and CRC of each chunk are stored. Some chunks are meant to be headers, every header's size should be 0x80, however the length of the STAHED1 chunk remains unchecked and the game memcpy the chunk to a 0x80 byte buffer with the length provided in the file. This way one is able to overwrite some pointers and get control of the execution flow. | ||
+ | | App: > v1.1.1 | ||
+ | | App: v1.1.1 | ||
+ | | April 24, 2017 | ||
+ | | February, 2017 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]] | ||
+ | |- | ||
+ | | Pokemon Picross | ||
+ | | Arbitrary memcpy via unchecked size | ||
+ | | When reading the savefile, the game handles some lists of buffers that are copied to memory. These buffers should always be 0x14-bytes long but the game uses the size provided in the savefile to copy them. These buffers are copied in some structs and thus with a big enough length value, one can overwrite the next struct which contains a size and a destination address for a memcpy. | ||
+ | | None? | ||
+ | | App: ? | ||
+ | | May 29, 2017 | ||
+ | | June, 2016 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]] | ||
+ | |- | ||
+ | | RPG Maker Fes/Player | ||
+ | | Buffer overflow on .bss section | ||
+ | | When loading a project, the game copies multiple chunks over the BSS section. However the number of chunks to copy is not checked, thus a large amount of chunk result in a buffer overflow. There's multiple way to exploit this flaw to gain an arbitrary memcpy or an arbitrary jump. | ||
+ | | None? | ||
+ | | App: ? | ||
+ | | August 28, 2017 | ||
+ | | August, 2017 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]] | ||
+ | |- | ||
+ | | RPG Maker Fes/Player | ||
+ | | Buffer overflow via unchecked file size | ||
+ | | When loading a project, the game loads the file to a 0x200000 bytes long buffer. However the size remains unchecked, so with a big enough file one can overflow the buffer and overwrite a thread stack and then achieve ROP. | ||
+ | | None? | ||
+ | | App: ? | ||
+ | | August 29, 2017 | ||
+ | | August, 2017 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]], [[User: ChampionLeake|ChampionLeake]] | ||
+ | |- | ||
+ | | Pokemon Omega Ruby/Alpha Sapphire | ||
+ | | PSS data heap/stack overflow | ||
+ | | When launching the game, multiple chunks from the save file are parsed and copied to a large heap buffer. When parsing PSS data (acquaintances, passerby) the game copies each entry to the heap buffer, the number of entries to copy is read from the end of the multiple pss data chunks and is not checked, leading to an overflow. The "PSS data - friends" chunk is vulnerable too, but the overflow occurs on the stack and unfortunately this isn't exploitable because of a 4 bytes uncontrolled value (in each entry) that gets written on sensitive data. | ||
+ | | None | ||
+ | | App: 1.4. System: [[11.6.0]]. | ||
+ | | October 1, 2017 | ||
+ | | June, 2016 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]] | ||
+ | |- | ||
+ | | RPG Maker Fes/Player | ||
+ | | OOB write | ||
+ | | When handling events in a map, the indices of "buttons" are not checked. This results in an out of bound bit write, one can thus write a rop directly on the stack (bit by bit). | ||
+ | | None? | ||
+ | | App: ? | ||
+ | | August 5, 2018 | ||
+ | | | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]] | ||
+ | |- | ||
+ | | Unholy Heights | ||
+ | | Buffer overflow via unchecked string size | ||
+ | | The game stores some utf-16 messages in the savefile. Right before the message is the length(u32) for the string, the game uses this size to memcpy the message from the savefile to the stack without checking the length. This allows one to overwrite some function addresses on the stack and form a rop chain. | ||
+ | | None | ||
+ | | App: Initial Version | ||
+ | | September 13, 2018 | ||
+ | | August, 2018 | ||
+ | | Kartik | ||
+ | |- | ||
+ | | Mononoke Forest | ||
+ | | String Buffer Overflow via unchecked string length | ||
+ | | The game stores plaintext profile names in the savefile. The profile names are strcpy/memcpy to different areas of the game's functions in the stack. Using a large extensive profile name, a user can overwrite some stack-registers and point to stack buffer addresses to eventually gain control of the stack to lead and form a rop-chain. | ||
+ | | None | ||
+ | | App: v1.0.0 | ||
+ | | August 14, 2019 | ||
+ | | February 8, 2019 | ||
+ | | [[User: ChampionLeake|ChampionLeake]] and [[User: Kartik|Kartik]] | ||
+ | |- | ||
+ | | Picross 3D: Round 2 | ||
+ | | Out of bounds array access allowing to point to fabricated objects and vtable | ||
+ | | Game only checks save header. With the last interacted save slot index at +0xb270 in the save data unchecked we can achieve a predictable out of bounds access, as well inserting ROP data without detecting save corruption. Game references an object from an array of 3 elements and passes it to a function that will read object pointers and hit a vtable call. With a copy save data left in memory and a properly calculated index, we can point to a fake object position in the save, vtable jump to a stack pivot and start the ROP chain. | ||
+ | | None | ||
+ | | App: Initial version | ||
+ | | September 10, 2020 | ||
+ | | August 24, 2020 | ||
+ | | [[User: Luigoalma|Luigoalma]] and [[User: Kartik|Kartik]] | ||
+ | |- | ||
+ | | Me and My Pets 3D | ||
+ | | String buffer overflow | ||
+ | | The game stores some strings in the savegame. Using a large enough string, once can overwrite addresses on the stack and form a ropchain. | ||
+ | | None | ||
+ | | App: Initial Version | ||
+ | | June 24, 2022 | ||
+ | | June 12, 2022 | ||
+ | | [[User: Kartik|Kartik]] | ||
+ | |- | ||
+ | | trl CGB emulator (GBC Virtual Console) | ||
+ | | HDMA heap buffer overflow | ||
+ | | trl's CGB emulation implements normal mode HDMA by a straight memcpy, failing to correctly bounds check the provided pointers/length. (hblank mode HDMA does perform proper bounds checks after each 0x10 byte memcpy) | ||
+ | In addition, each area of memory (ROM, SRAM, VRAM, WRAM, SRAM, OAM, MMIO+HRAM) are allocated seperately, from the CTR-SDK heap. | ||
+ | |||
+ | Thus, doing HDMA to an area past the end of VRAM (VRAM bank 1 must be set here) would cause heap overflow. The maximum possible memcpy here would be 0x800 bytes to the end of VRAM less 0x10 bytes. | ||
+ | |||
+ | This is hard to exploit. The heap buffers get freed when choosing to close the game from the Home Menu, with the Home Menu holding the GPU. It may be possible to make calls to APT in ROP in this state to get Home Menu to release the GPU. | ||
+ | |||
+ | To exploit this, SM83 code execution inside the emulator would need to be obtained. This could be done by human-viable or remote (emulated link-cable) code execution exploits (for example Pokémon Yellow (non-JP)/Gold/Silver/Crystal); by crafting SRAM (where the game itself has a savegame exploit); or by crafting an emulator save-state (for games where save-states are enabled). | ||
+ | |||
+ | DMG (mono Game Boy) games are not exploitable; the bug is in CGB-specific functionality which is disabled in mono Game Boy games (determined by ROM header). | ||
+ | | None | ||
+ | | trl as included in Pokémon Crystal VC | ||
+ | | January 2024 | ||
+ | | ~2017 | ||
+ | | [[User:Riley|Riley]] | ||
+ | |} | ||
+ | |||
+ | ==Flipnote Studio 3D== | ||
+ | |||
+ | {| class="wikitable" border="1" | ||
+ | |- | ||
+ | ! Summary | ||
+ | ! Description | ||
+ | ! Fixed in app/system version | ||
+ | ! Timeframe info related to this was added to wiki | ||
+ | ! Flaw discovered by | ||
+ | |- | ||
+ | | KFH frame count overflow | ||
+ | | The KFH frame count field should not be >= 0x3E8, but it wasn't checked and so uncontrolled data were written over pointers, causing an unexploitable crash. | ||
+ | | System: 11.6 | ||
+ | | September 20, 2017 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]] | ||
+ | |- | ||
+ | | KMI paper color overflow | ||
+ | | Paper color field (and similar color fields) in KMI chunks was not checked, a too high value caused a jump to an uncontrolled location. | ||
+ | | System: 11.6 | ||
+ | | September 20, 2017 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]] | ||
+ | |- | ||
+ | | KSN BGM data size overflow | ||
+ | | The size of the BGM data in the KSN chunk was not checked, it was used in a memcpy so with a big enough size one could overwrite a thread stack on linear mem and achieve ROP (notehax v1). | ||
+ | | System: 11.6 | ||
+ | | September 20, 2017 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]] | ||
+ | |- | ||
+ | | KMC chunk unchecked | ||
+ | | The KMC chunk was not verified at all, the CRC32 and the size were not checked. A big enough size caused an integer overflow and made the game read the file backward. | ||
+ | | System: 11.6 | ||
+ | | September 20, 2017 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]] | ||
+ | |- | ||
+ | | KMI layer size unchecked | ||
+ | | The 3 layer size fields in KMI chunks were not checked, leading to some crashes in the editor. | ||
+ | | System: 11.6 | ||
+ | | September 20, 2017 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]] | ||
+ | |- | ||
+ | | Bad "queue" implementation | ||
+ | | When a KWZ was parsed, frames were copied in a kind of queue, bounds were not checked obviously, so with the KMI layer size flaw one was able to fill completely the queue, then write past the buffer and overwrite a heap chunk header (notehax v2). This is not possible anymore, the queue cannot be filled because layer sizes are checked. Moreover each time an element is removed from the queue, the whole content is memmoved *facepalm*. | ||
+ | | System: 11.6 | ||
+ | | September 20, 2017 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]] | ||
|} | |} | ||
Line 49: | Line 304: | ||
* Pushmo (3DSWare), QR codes: level name is properly limited to 16 characters, game doesn't crash with a longer name. The only possible crashes are triggered by out-of-bounds array index values, these crashes are not exploitable due to the index value being 8bit. | * Pushmo (3DSWare), QR codes: level name is properly limited to 16 characters, game doesn't crash with a longer name. The only possible crashes are triggered by out-of-bounds array index values, these crashes are not exploitable due to the index value being 8bit. | ||
− | * Pyramids (3DSWare), QR codes: no strings. Only crashes are from out-of-bounds values (like background ID) and are not exploitable. | + | * [[Pyramids (3DSWare)]], QR codes: no strings. Only crashes are from out-of-bounds values (like background ID) and are not exploitable. |
+ | |||
+ | * [[Pyramids 2 (3DSWare)]], QR codes: no strings. Only crashes are from out-of-bounds values (like background ID) and are not exploitable. | ||
* [https://github.com/yellows8/mm3d_re The Legend of Zelda: Majora's Mask 3D] | * [https://github.com/yellows8/mm3d_re The Legend of Zelda: Majora's Mask 3D] | ||
− | * "The Legend of Zelda: A Link Between Worlds" and "The Legend of Zelda: Tri Force Heroes": these games don't crash at all when the entire save-file(minus constant header data) is overwritten with /dev/random output / 0xFF-bytes. All of the CRC32s were updated for this of course. | + | * "The Legend of Zelda: A Link Between Worlds" and "The Legend of Zelda: Tri Force Heroes": these games don't crash at all when the entire save-file(minus constant header data) is overwritten with /dev/random output / 0xFF-bytes. All of the CRC32s were updated for this of course. Note that this refers to the regular save file: Tri Force Heroes can be exploited via BOSS extdata - see above. |
+ | |||
+ | * Pokemon Mystery Dungeon: Gates to Infinity has the same unchecked file bounds as Pokemon Super Mystery Dungeon, however since save compression was introduced in Pokemon Super Mystery Dungeon, it only allocates one buffer within the application heap instead of several within the linear heap, resulting in nothing to corrupt or overwrite even if the file's length is extended past its allocation. | ||
+ | |||
+ | * "Kid Icarus: Uprising": Overwriting the entire savedata results in various crashes, nothing useful. | ||
+ | |||
+ | * Savedata/extdata for "Super Smash Bros 3DS": Overwriting the various files stored under savedata/extdata results in useless crashes. | ||
+ | |||
+ | * "StarFox 64 3D": Doesn't crash at all with the entire savedata overwritten. | ||
+ | |||
+ | * "Frogger 3D": Overwriting a savefile with random-data results in *nothing* crashing. | ||
+ | |||
+ | * "Mutant Mudds": Overwriting the savefile with random data results in a crash | ||
+ | |||
+ | * "Worcle Worlds": Overwriting the savefile with 0xFF results in a crash due to an out of bound read | ||
+ | |||
+ | * "Animal Crossing: New Leaf": Creating a QR code from random data results in a valid QR code and a random design. In some very rare cases(which aren't always reproducible?) a crash/etc may occur, but this isn't known to be useful. | ||
+ | |||
+ | * "Angry Birds Star Wars": Strings in the savefile are preceded by their lengths. These strings are never stored on the stack and are memcpy'd into heap memory. If the size is invalid the alloc will fail and thus the memcpy will operate on a nullptr resulting in a useless data abort. | ||
+ | |||
+ | * "Gem Smashers": Overwriting the savefile with random bytes results in useless crashes. | ||
+ | |||
+ | * "Luxor:" Strings/plaintext in the savefile are present and these's no checks. Overwriting the whole save (excluding the header), with /dev/random cause a useless crash. | ||
+ | |||
+ | * "Luv Me Buddies Wonderland:" Doesn't crash at all with the entire savedata overwritten. Overwriting some areas, points to useless nulls | ||
==Crashes needing investigation== | ==Crashes needing investigation== | ||
Line 76: | Line 357: | ||
| 2012 | | 2012 | ||
| [[User:Ichfly|Ichfly]] | | [[User:Ichfly|Ichfly]] | ||
+ | |- | ||
+ | | 3DS [[System Settings]] stack smash via title strings in [[DSiWare_Exports]] | ||
+ | | DSiWare export banners contain 16 consecutive 0x100 byte, utf-16 game title strings for different languages. Nintendo correctly limits the string's max length by placing a NULL at str[127] before it's copied to the stack. However, they didn't allocate enough space for all 128 wchars (char/wchar type confusion?), so an attacker can craft a valid full-length string that will crash the stack at about str+0xEC. ROP execution can then be obtained from this crash in DSiWare Data Management as demonstrated [https://github.com/zoogie/Bannerbomb3 here]. | ||
+ | |||
+ | Interesting note: A line feed wchar (00 0A) at any point in the string before the crash offset will prevent the crash from occurring. | ||
+ | | [[11.17.0-50]] | ||
+ | | [[11.13.0-45]] | ||
+ | | Dec. 2018 | ||
+ | | Zoogie | ||
+ | |- | ||
+ | | 3DS SAFE_MODE [https://www.3dbrew.org/wiki/System_Settings#System_Updater System Updater] stack smash from proxy-url string | ||
+ | | During [[Recovery Mode]] and after all 3 wifi slots fail to find an access point for sysupdate, a user is permitted to access the wifi settings mode to make changes. Here, if the proxy-url field string's NULL terminator had been altered beforehand, a stack smash can occur when the user selects Proxy Settings -> Detailed Setup and the corrupted url string is displayed. | ||
+ | |||
+ | This is a difficult crash to control because the url string is converted from ascii to utf-16 between the slot and stack, effectively reducing the available gadgets to 0.4% of the normal amount. It's possible to improvise an "escape" using an eoreq pc w/shift gadget to combine registers and form a jump that can access 1/2 of all available gadgets. | ||
+ | |||
+ | Because this exploit runs *under* SAFE_MODE, it's possible to run safehax with one's choice of k11 and arm9 hax. Prerequisite: a userland exploit with cfg:s/i access to modify the wifi slot. A demonstration can be viewed [https://github.com/zoogie/unSAFE_MODE here]. | ||
+ | | None | ||
+ | | [[11.13.0-45]] | ||
+ | | Jan. 2020 | ||
+ | | Zoogie | ||
+ | |- | ||
+ | | [[Nintendo 3DS Sound]] | ||
+ | | When a .m4a is loaded, the song name is copied to a 256 byte buffer. When the song name begins with a Unicode BOM marker, it memcpy's the tag using the user-provided length. This gives an arbitrary write which can be used to achieve ROP. | ||
+ | | [[11.4.0-37]] | ||
+ | | [[11.4.0-37]] | ||
+ | | June/July 2016 | ||
+ | | [[User:nedwill|nedwill]] | ||
+ | |- | ||
+ | | [[EShop]] | ||
+ | | When creating an audio decoder object for the moflex movie player, if the audio codec is PCM16, the application uses an uninitialized value as a pointer. One can spray the heap to get control of that pointer and achieve ROP. | ||
+ | | None | ||
+ | | [[11.14.0-46]] | ||
+ | | 2020 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]] | ||
|} | |} | ||
Line 85: | Line 400: | ||
! Fixed in version | ! Fixed in version | ||
! Last version this flaw was checked for | ! Last version this flaw was checked for | ||
+ | ! Introduced with version | ||
+ | ! Timeframe info related to this was added to wiki | ||
+ | ! Timeframe this was discovered | ||
+ | ! Discovered by | ||
+ | |- | ||
+ | | Webkit/web-browser bugs | ||
+ | | spider has had at least three different code-execution exploits. Majority of them are use-after-free issues. See also [[browserhax|here]]. | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | 2013? | ||
+ | | | ||
+ | | A lot of people. | ||
+ | |- | ||
+ | | Old3DS/New3DS [[Internet_Browser|Browser-version-check]] bypass | ||
+ | | When the browser-version-check code runs where the savedata for it was never initialized(such as when the user used the "Initialize savedata" option), it will use base_timestamp=0 instead of the timestamp loaded from savedata. This is then used with "if(cur_timestamp - base_timestamp >= <24h timestamp>){Run browser-version-check HTTPS request code}". | ||
+ | Hence, if the savedata was just initialized, and if the system datetime is set to before January 2, 2000, the browser-version-check will be skipped. This includes January 1, 2000, 00:00, because that's the epoch(timestamp value 0x0) used with this timestamp. | ||
+ | |||
+ | See [http://yls8.mtheall.com/3dsbrowserhax.php here] for bypass usage instructions. | ||
+ | |||
+ | This was fixed with [[10.7.0-32|10.7.0-32]], see [[Internet_Browser|here]] for details. | ||
+ | | [[10.7.0-32|10.7.0-32]] | ||
+ | | | ||
+ | | [[9.9.0-26|9.9.0-26]] | ||
+ | | February 25, 2016 | ||
+ | | November 2, 2015 (Exactly one week after the browser version pages were initially updated server-side) | ||
+ | | [[User:Yellows8|Yellows8]] | ||
+ | |- | ||
+ | | Skater - Bookmark OOB write | ||
+ | | Each bookmark has an id that should not exceed 0x63 (99), however ids are not checked, this results in an OOB write on the stack, but only the value 0x01 can be written. | ||
+ | | | ||
+ | | [[11.6.0-39|11.6.0-39]] | ||
+ | | | ||
+ | | May 21, 2018 | ||
+ | | May 20, 2018 | ||
+ | | [[User:Nba_Yoh|MrNbaYoh]] | ||
+ | |- | ||
+ | | MicroSD Management - malformed security blob causes stack buffer overflow (mhax) | ||
+ | | The MicroSD Management application's parsing of Windows NTLM security blobs in the SMB/CIFS protocol doesn't verify that the client's specified NT domain name is less than 32 UTF-16 characters. When it's longer, a stack buffer overrun occurs, leading to a ROP chain and complete control of the mcopy application. | ||
+ | |||
+ | The malformed security blob can be sent by an attacker within the SMB_COM_SESSION_SETUP_ANDX (0x73) packet. | ||
+ | | [[11.8.0-41|11.8.0-41]] | ||
+ | | [[11.8.0-41|11.8.0-41]] | ||
+ | | [[9.0.0-20|9.0.0-20]] | ||
+ | | August 12, 2018 | ||
+ | | 2018 | ||
+ | | smea | ||
+ | |} | ||
+ | |||
+ | ==Home Menu== | ||
+ | {| class="wikitable" border="1" | ||
+ | |- | ||
+ | ! Summary | ||
+ | ! Description | ||
+ | ! Fixed in version | ||
+ | ! Last version this flaw was checked for | ||
+ | ! Introduced with version | ||
! Timeframe info related to this was added to wiki | ! Timeframe info related to this was added to wiki | ||
! Timeframe this was discovered | ! Timeframe this was discovered | ||
! Discovered by | ! Discovered by | ||
|- | |- | ||
− | | [[Home Menu]] [[System_SaveData|NAND-savedata]] Launcher.dat icons | + | | u8 brightness setting OOB index (menuhax67) |
+ | | Config block 0x50001, which contains a u8 brightness setting that indexes a table of u32 addresses, can be set to an out-of-bounds index (it's normally 1-5). Located within cfg block 0x50009, there exists a single controllable u32 that's located within the u8's range. With these set properly, one can eventually redirect a function pointer to an address of their choice. This is triggered after the Home Menu quick launch tab is activated. POC [https://github.com/zoogie/menuhax67 here]. | ||
+ | | None | ||
+ | | [[11.13.0-45]] | ||
+ | | | ||
+ | | October 4, 2020 | ||
+ | | September, 2020 | ||
+ | | Zoogie | ||
+ | |- | ||
+ | | bossbannerhax | ||
+ | | After successfully loading [[Extended_Banner|extended-banner]] data(done when selecting an icon), Home Menu attempts to load "[[CBMD]]" data into a 0x100000-byte heap buffer from the [[BOSS_Services|stored]] SpotPass content. When successful and the magic-number is CBMD, Home Menu then decompresses the exbanner sections into another fixed-size heap buffer, without checking the outsize at all. The main CBMD CGFX code with ExeFS checks the size, but this code doesn't(however this is exbanner "CBMD", not a "normal" CBMD). | ||
+ | |||
+ | Used with menuhax as of v3.2. | ||
+ | | [[11.3.0-36|11.3.0-X]] | ||
+ | | | ||
+ | | [[1.0.0-0|1.0.0-0]] | ||
+ | | November 18, 2016 | ||
+ | | December 23, 2014 | ||
+ | | [[User:Yellows8|Yellows8]] | ||
+ | |- | ||
+ | | sdiconhax | ||
+ | | This is basically the same as nandiconhax, the vulnerable SD/NAND functions are ''identical'' minus the file-buffer offsets. Exploitation is different due to different heap-buffer location though. Unlike nandiconhax, the icon buffer for SD is located in linearmem(with recent Home Menu versions at least). This is used by [[menuhax]]. | ||
+ | | [[11.1.0-34|11.1.0-X]] | ||
+ | | | ||
+ | | [[4.0.0-7|4.0.0-X]] | ||
+ | | July 27, 2016 | ||
+ | | October 23, 2015 | ||
+ | | [[User:Yellows8|Yellows8]] | ||
+ | |- | ||
+ | | [[System_SaveData|NAND-savedata]] Launcher.dat icons (nandiconhax) | ||
| The homemenu code processing the titleid list @ launcherdat+8 copies those titleIDs to another buffer, where the offset relative to that buffer is calculated using the corresponding s8/s16 entries. Those two values are not range checked at all. Hence, one can use this to write u64(s) with arbitrary values to before/after this allocated output buffer. See [[Home_Menu|here]] regarding Launcher.dat structure. | | The homemenu code processing the titleid list @ launcherdat+8 copies those titleIDs to another buffer, where the offset relative to that buffer is calculated using the corresponding s8/s16 entries. Those two values are not range checked at all. Hence, one can use this to write u64(s) with arbitrary values to before/after this allocated output buffer. See [[Home_Menu|here]] regarding Launcher.dat structure. | ||
Line 97: | Line 498: | ||
Home Menu has some sort of fail-safe system(or at least on v9.7) when Home Menu crashes due to Launcher.dat(this also applies for other things with Home Menu): after crashing once, Home Menu resets Launcher.dat to a state where it no longer crashes anymore. However, note that any exploits using this which hang/etc without crashing will still brick the system. '''Hence, attempting anything with this on physnand without hw-nand-access isn't really recommended.''' | Home Menu has some sort of fail-safe system(or at least on v9.7) when Home Menu crashes due to Launcher.dat(this also applies for other things with Home Menu): after crashing once, Home Menu resets Launcher.dat to a state where it no longer crashes anymore. However, note that any exploits using this which hang/etc without crashing will still brick the system. '''Hence, attempting anything with this on physnand without hw-nand-access isn't really recommended.''' | ||
− | | | + | | [[11.1.0-34|11.1.0-X]] |
− | | [[ | + | | |
+ | | [[4.0.0-7|4.0.0-X]] | ||
| | | | ||
| May 14, 2015 | | May 14, 2015 | ||
| [[User:Yellows8|Yellows8]] | | [[User:Yellows8|Yellows8]] | ||
|- | |- | ||
− | | | + | | Theme-data decompression buffer overflow ([[menuhax|themehax]]) |
| The only func-call size parameter used by the theme decompression function is one for the compressed size, none for the decompressed size. The decompressed-size value from the LZ header is used by this function to check when to stop decompressing, but this function itself has nothing to verify the decompressed_size with. The code calling this function does not check or even use the decompressed size from the header either. | | The only func-call size parameter used by the theme decompression function is one for the compressed size, none for the decompressed size. The decompressed-size value from the LZ header is used by this function to check when to stop decompressing, but this function itself has nothing to verify the decompressed_size with. The code calling this function does not check or even use the decompressed size from the header either. | ||
Line 115: | Line 517: | ||
| [[10.2.0-28|10.2.0-X]] | | [[10.2.0-28|10.2.0-X]] | ||
| [[10.2.0-28|10.2.0-X]] | | [[10.2.0-28|10.2.0-X]] | ||
+ | | <Old3DS/New3DS version which added initial theme support> | ||
| | | | ||
| December 22, 2014 | | December 22, 2014 | ||
| [[User:Yellows8|Yellows8]], [[User:Myria|Myria]] independently (~spring 2015) | | [[User:Yellows8|Yellows8]], [[User:Myria|Myria]] independently (~spring 2015) | ||
|- | |- | ||
− | | | + | | Shuffle body-data buffer overflow ([[menuhax|shufflehax]]) |
| See [[menuhax|here]]. | | See [[menuhax|here]]. | ||
| [[10.6.0-31|10.6.0-X]] | | [[10.6.0-31|10.6.0-X]] | ||
| [[10.6.0-31|10.6.0-X]] | | [[10.6.0-31|10.6.0-X]] | ||
+ | | [[9.3.0-21|9.3.0-X]] | ||
| | | | ||
| January 3, 2015 | | January 3, 2015 | ||
| [[User:Yellows8|Yellows8]] | | [[User:Yellows8|Yellows8]] | ||
|- | |- | ||
− | | | + | | Extdata file-data loading buffer overflow |
− | | | + | | The extdata file-reading code allocates a fixed-size heap buffer for the expected filesize, then reads the filedata into this buffer using the actual FS filesize. Before v5.0 the filesize used here wasn't validated, hence if the filesize is larger than alloc_size a buffer overflow would occur. ''After'' doing the file-read it does validate that the actual_readsize matches the alloc_size, but at this point the buffer overflow has already occurred. |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | This affected at least the following: SaveData.dat and Cache.dat. | |
− | This | + | This can be triggered with SaveData.dat by installing a <v4.0 Home Menu version, with Home Menu extdata from >=v4.0 still on SD. When this is done with v2.0 Home Menu, a kernelpanic occurs when processing an AM command(it appears a buffer ptr which is then passed to a command was overwritten with 0x0 - of course other SaveData.dat filesizes may result in different behaviour). |
− | | [[ | + | | [[5.0.0-11|5.0.0-X]] |
| | | | ||
− | | | + | | [[2.0.0-2|2.0.0-X]] |
− | | | + | | June 9, 2016 |
+ | | June 9, 2016 | ||
| [[User:Yellows8|Yellows8]] | | [[User:Yellows8|Yellows8]] | ||
|} | |} | ||
+ | |||
+ | The icon data arrays used with {sd/nand}iconhax were added to SaveData.dat/Launcher.dat with [[4.0.0-7|4.0.0-X]], hence the vulnerable functions were added with that same version. | ||
+ | |||
+ | With <=v4.0 the SaveData.dat buffer is located in the regular heap. It's unknown when exactly it was moved to linearmem, which is where it's located with recent versions. It's located in linearmem for KOR >=v9.6 for example. | ||
+ | |||
+ | The SaveData.dat/Launcher.dat icon vulns were fixed by doing various unsigned >=60/>=360 checks on the loaded values. When these checks fail, it just skips over handling this icon entry. Hence, the original value can't be negative / out-of-bounds any more. | ||
==Useless crashes== | ==Useless crashes== |
Latest revision as of 14:31, 5 January 2024
This page lists vulnerabilities / exploits for 3DS applications and applets. Exploiting these initially results in ROP, from that ROP one can then for example try exploiting system flaw(s).
Non-system applications[edit]
Application name | Summary | Description | Fixed in app/system version | Last app/system version this flaw was checked for | Timeframe info related to this was added to wiki | Timeframe this vuln was discovered | Vuln discovered by |
---|---|---|---|---|---|---|---|
Cubic Ninja | Map-data stack smash | See here regarding Ninjhax. | None | App: Initial version. System: 10.4.0-29. | Ninjhax release | July 2014 | smea |
The Legend of Zelda: Ocarina of Time 3D | UTF-16 name string buffer overflow via unchecked u8 length field | The u8 at offset 0x2C in the savefile is the character-length of the UTF-16 string at offset 0x1C. When copying this string, it's essentially a memory-copy with lenval*2, not a string-copy. This can be used to trigger buffer overflows at various locations depending on the string length.
On March 11, 2015, an exploit using this vuln was released, that one was intended for warez/etc. The following exploit wasn't released before then mainly because doing so would (presumably) result in the vuln being fixed. The following old exploit was released on March 14, 2015: [1]. |
None | App: Initial version. System: 10.6.0-31. | March 11, 2015 | Around October 22, 2012 | Yellows8 |
Super Smash Bros 3DS | Buffer overflow in local-multiplayer beacon handling. | See here. | App: v1.1.3 | See here. System: 10.3.0-28. | Time of exploit release. | See here. | Yellows8 |
Pokemon Super Mystery Dungeon | Heap overflow within linear memory via unchecked save file length | Pokemon Super Mystery Dungeon uses zlib compression for most of its save files, possibly due to the save files being larger than its predecessor, Gates to Infinity. When a save file is being prepared to be loaded and read from, only a 0x32000 large buffer is allocated for file reading, and a 0x3e800-large buffer for decompression is also allocated before the file is read. However, the game does not limit the size of the file read to this allocation bound, allowing for the file to overflow into the linear memory heap and into the next allocation. Since Pokemon Super Mystery Dungeon stores allocation memchunks directly before the allocation, overwriting the next memchunk with a corrupted one allows for arbitrary writes of linear heap pointers when the next buffer is allocated or arbitrary writes of any pointer within writable memory when the corrupted buffer is freed. | None | O3DS: 11.3.0-36. N3DS: 11.4.0-37. | Time of exploit release. | April 14, 2016 | Shiny Quagsire |
VVVVVV | Buffer overflow in XML save file array parsing | VVVVVV utilizes several XML files (renamed with a .vvv extension) to store level save data, stats and settings. Within these XML files are several tags containing an array of data which, when parsed, is not properly checked to be of proper length for the tag being parsed from. This allows for an overflow of 16-bit array values from the location where the array is parsed. With unlock.vvv, XML data is parsed to the stack, and with level saves the heap. This allows for the pointer where the level save worldmap tag array should be parsed into to be overwritten with a stack address, allowing for ROP from within the XML array parsing function on the next level load. | App: v1.1 | 10.7.0-32. | Time of exploit release. | April 25, 2016 | Shiny Quagsire |
Citizens of Earth | Save file read stack smash | Citizens of Earth also uses "XML" files for saves, which are actually entirely binary data (not XML at all) with no checksums. These files are read from the filesystem on to a fixed size stack buffer which leads to an incredibly trivial stack smash. When using the autosave slot for this, the save is parsed when the user selects "continue". When using one of the dedicated save slots (1-3), the save is parsed shortly after the company splash screens fade. Note that the save is read quite high (descending) on the stack - when exploiting this, one would likely need to move SP due to almost instantly overflowing the physical stack. | None | 10.7.0-32. | Time of exploit release. | May 5, 2016 | Dazzozo |
SmileBASIC 3.x | Poor parameter validation on "BGSCREEN" command | The SmileBASIC "BGSCREEN" command's second parameter is not properly validated as being within range. As a result, one can set the screen size to an absurdly large value. This means that the "BGGET" and "BGPUT" commands can then be used on out-of-range values to read and write a significant chunk of the interpreter's address space.
With a series of carefully-designed BGPUT commands, one can build a ROP chain and cause it to be executed. |
App: 3.3.2. | System: 11.0.0-33. | July 20, 2016 | Around June 26, 2016 | slackerSnail, 12Me12, incvoid
Exploited by MrNbaYoh and plutoo. |
SmileBASIC 3.x | Subscripted TIME$/DATE$ allow write access to DATA/BSS | Utf-16 characters can be assigned to subscripted TIME$/DATE$ interpreter sysvars which results in write-only access to all of DATA and some BSS in userland.
TIME$[0]/DATE$[0] actually point to somewhere in rodata, and an overly large subscript can be used to write well past it and into the aforementioned areas. Demo here. |
App: 3.6.2 (3.6.0 latest for US/EU, JP appvers. can be downgraded) | System: 11.13.0-45. | April 2020 | February 2020 | bug publicly documented here.
Exploited by Zoogie |
The Legend of Zelda: Tri Force Heroes | CTRSDK CTPK buffer overflow combined with game's usage of SpotPass | During the very first screen displayed by the game during boot("Loading..."), just seconds after title launch, the game loads CTPK from the stored SpotPass content. Hence, this game could be exploited via the vulnerable CTRSDK CTPK code if one could get custom SpotPass data into extdata somehow(ctr-httpwn >=v1.2 with bosshaxx allows this).
The code for this runs from a thread separate from the main-thread, with the stack in linearmem heap. This SpotPass handling triggers before the game ever opens the regular savedata archive. The extdata is opened at some point before this: it opens a file for checking if it exists, then immediately closes it. The two SpotPass URLs for this have always(?) returned HTTP 404 as of November 2016. It appears these were intended for use as textures for additional costumes(and never got used publicly), but this wasn't tested. This is used by ctpkpwn_tfh. |
None | App: v2.1.0 | November 18, 2016 | November 14, 2016 | Yellows8 |
Pixel Paint | Buffer overflow via unchecked extdata file length | Pixel Paint loads pictures saved by the user from extdatas. The file is read to a fixed size buffer but the file length remains unchecked, so with a large enough file, one can overwrite pointers in memory and gain control of the execution flow. | None | App: Initial version. System: 11.2.0-35. | December 27, 2016 | November 5, 2016 | MrNbaYoh |
Steel Diver : Sub Wars | Heap overflow / arbitrary memcpy | Savefile datas are stored as key/value pairs, a large enough string key makes the game overwrite a memcpy source/destination addresses and size arguments. So one can actually memcpy a rop on the stack and gain control of the execution flow. | None | System: 11.2.0-35. | December 27, 2016 | Around July 15, 2016 | MrNbaYoh, Vegaroxas |
1001 Spikes | Buffer overflow via unchecked array-indexes in XML savefile parsing | The savefiles are stored as renamed .xml files, which contain several tags with attributes like 'array-index="array-value"', where both of these are converted from ASCII strings to integers as signed-int32, and the array-value given blindly written to an array inside a structure using the (unchecked) index given. With several of these attributes, one can overwrite the stack starting from the stored lr of the function that does this parsing, and write a ROP chain there. Testing used the "LevelAttempts" tag which is the last such tag parsed in that function. | None | App: v1.2.0 (TMD v2096) | December 27, 2016 | Around November 2, 2016 | Riley |
Pokemon Omega Ruby/Alpha Sapphire | Secret base team name heap overflow | When the player wants to edit the team name, it is copied over the heap, however its length is not verified. So with a large enough team name one can overwrite some pointers and get two arbitrary jumps and then get control of the execution flow. | None | App: 1.4. System: 11.2.0-35. | December 30, 2016 | June, 2016 | MrNbaYoh |
Swapdoodle | Heap buffer overflow via unchecked size | The letter file format used by doodlebomb is composed of multiple chunks. Each chunks is described in the header of the file where the name, size and CRC of each chunk are stored. Some chunks are meant to be headers, every header's size should be 0x80, however the length of the STAHED1 chunk remains unchecked and the game memcpy the chunk to a 0x80 byte buffer with the length provided in the file. This way one is able to overwrite some pointers and get control of the execution flow. | App: > v1.1.1 | App: v1.1.1 | April 24, 2017 | February, 2017 | MrNbaYoh |
Pokemon Picross | Arbitrary memcpy via unchecked size | When reading the savefile, the game handles some lists of buffers that are copied to memory. These buffers should always be 0x14-bytes long but the game uses the size provided in the savefile to copy them. These buffers are copied in some structs and thus with a big enough length value, one can overwrite the next struct which contains a size and a destination address for a memcpy. | None? | App: ? | May 29, 2017 | June, 2016 | MrNbaYoh |
RPG Maker Fes/Player | Buffer overflow on .bss section | When loading a project, the game copies multiple chunks over the BSS section. However the number of chunks to copy is not checked, thus a large amount of chunk result in a buffer overflow. There's multiple way to exploit this flaw to gain an arbitrary memcpy or an arbitrary jump. | None? | App: ? | August 28, 2017 | August, 2017 | MrNbaYoh |
RPG Maker Fes/Player | Buffer overflow via unchecked file size | When loading a project, the game loads the file to a 0x200000 bytes long buffer. However the size remains unchecked, so with a big enough file one can overflow the buffer and overwrite a thread stack and then achieve ROP. | None? | App: ? | August 29, 2017 | August, 2017 | MrNbaYoh, ChampionLeake |
Pokemon Omega Ruby/Alpha Sapphire | PSS data heap/stack overflow | When launching the game, multiple chunks from the save file are parsed and copied to a large heap buffer. When parsing PSS data (acquaintances, passerby) the game copies each entry to the heap buffer, the number of entries to copy is read from the end of the multiple pss data chunks and is not checked, leading to an overflow. The "PSS data - friends" chunk is vulnerable too, but the overflow occurs on the stack and unfortunately this isn't exploitable because of a 4 bytes uncontrolled value (in each entry) that gets written on sensitive data. | None | App: 1.4. System: 11.6.0. | October 1, 2017 | June, 2016 | MrNbaYoh |
RPG Maker Fes/Player | OOB write | When handling events in a map, the indices of "buttons" are not checked. This results in an out of bound bit write, one can thus write a rop directly on the stack (bit by bit). | None? | App: ? | August 5, 2018 | MrNbaYoh | |
Unholy Heights | Buffer overflow via unchecked string size | The game stores some utf-16 messages in the savefile. Right before the message is the length(u32) for the string, the game uses this size to memcpy the message from the savefile to the stack without checking the length. This allows one to overwrite some function addresses on the stack and form a rop chain. | None | App: Initial Version | September 13, 2018 | August, 2018 | Kartik |
Mononoke Forest | String Buffer Overflow via unchecked string length | The game stores plaintext profile names in the savefile. The profile names are strcpy/memcpy to different areas of the game's functions in the stack. Using a large extensive profile name, a user can overwrite some stack-registers and point to stack buffer addresses to eventually gain control of the stack to lead and form a rop-chain. | None | App: v1.0.0 | August 14, 2019 | February 8, 2019 | ChampionLeake and Kartik |
Picross 3D: Round 2 | Out of bounds array access allowing to point to fabricated objects and vtable | Game only checks save header. With the last interacted save slot index at +0xb270 in the save data unchecked we can achieve a predictable out of bounds access, as well inserting ROP data without detecting save corruption. Game references an object from an array of 3 elements and passes it to a function that will read object pointers and hit a vtable call. With a copy save data left in memory and a properly calculated index, we can point to a fake object position in the save, vtable jump to a stack pivot and start the ROP chain. | None | App: Initial version | September 10, 2020 | August 24, 2020 | Luigoalma and Kartik |
Me and My Pets 3D | String buffer overflow | The game stores some strings in the savegame. Using a large enough string, once can overwrite addresses on the stack and form a ropchain. | None | App: Initial Version | June 24, 2022 | June 12, 2022 | Kartik |
trl CGB emulator (GBC Virtual Console) | HDMA heap buffer overflow | trl's CGB emulation implements normal mode HDMA by a straight memcpy, failing to correctly bounds check the provided pointers/length. (hblank mode HDMA does perform proper bounds checks after each 0x10 byte memcpy)
In addition, each area of memory (ROM, SRAM, VRAM, WRAM, SRAM, OAM, MMIO+HRAM) are allocated seperately, from the CTR-SDK heap. Thus, doing HDMA to an area past the end of VRAM (VRAM bank 1 must be set here) would cause heap overflow. The maximum possible memcpy here would be 0x800 bytes to the end of VRAM less 0x10 bytes. This is hard to exploit. The heap buffers get freed when choosing to close the game from the Home Menu, with the Home Menu holding the GPU. It may be possible to make calls to APT in ROP in this state to get Home Menu to release the GPU. To exploit this, SM83 code execution inside the emulator would need to be obtained. This could be done by human-viable or remote (emulated link-cable) code execution exploits (for example Pokémon Yellow (non-JP)/Gold/Silver/Crystal); by crafting SRAM (where the game itself has a savegame exploit); or by crafting an emulator save-state (for games where save-states are enabled). DMG (mono Game Boy) games are not exploitable; the bug is in CGB-specific functionality which is disabled in mono Game Boy games (determined by ROM header). |
None | trl as included in Pokémon Crystal VC | January 2024 | ~2017 | Riley |
Flipnote Studio 3D[edit]
Summary | Description | Fixed in app/system version | Timeframe info related to this was added to wiki | Flaw discovered by |
---|---|---|---|---|
KFH frame count overflow | The KFH frame count field should not be >= 0x3E8, but it wasn't checked and so uncontrolled data were written over pointers, causing an unexploitable crash. | System: 11.6 | September 20, 2017 | MrNbaYoh |
KMI paper color overflow | Paper color field (and similar color fields) in KMI chunks was not checked, a too high value caused a jump to an uncontrolled location. | System: 11.6 | September 20, 2017 | MrNbaYoh |
KSN BGM data size overflow | The size of the BGM data in the KSN chunk was not checked, it was used in a memcpy so with a big enough size one could overwrite a thread stack on linear mem and achieve ROP (notehax v1). | System: 11.6 | September 20, 2017 | MrNbaYoh |
KMC chunk unchecked | The KMC chunk was not verified at all, the CRC32 and the size were not checked. A big enough size caused an integer overflow and made the game read the file backward. | System: 11.6 | September 20, 2017 | MrNbaYoh |
KMI layer size unchecked | The 3 layer size fields in KMI chunks were not checked, leading to some crashes in the editor. | System: 11.6 | September 20, 2017 | MrNbaYoh |
Bad "queue" implementation | When a KWZ was parsed, frames were copied in a kind of queue, bounds were not checked obviously, so with the KMI layer size flaw one was able to fill completely the queue, then write past the buffer and overwrite a heap chunk header (notehax v2). This is not possible anymore, the queue cannot be filled because layer sizes are checked. Moreover each time an element is removed from the queue, the whole content is memmoved *facepalm*. | System: 11.6 | September 20, 2017 | MrNbaYoh |
Useless crashes / applications which were fuzzed[edit]
- Pushmo (3DSWare), QR codes: level name is properly limited to 16 characters, game doesn't crash with a longer name. The only possible crashes are triggered by out-of-bounds array index values, these crashes are not exploitable due to the index value being 8bit.
- Pyramids (3DSWare), QR codes: no strings. Only crashes are from out-of-bounds values (like background ID) and are not exploitable.
- Pyramids 2 (3DSWare), QR codes: no strings. Only crashes are from out-of-bounds values (like background ID) and are not exploitable.
- "The Legend of Zelda: A Link Between Worlds" and "The Legend of Zelda: Tri Force Heroes": these games don't crash at all when the entire save-file(minus constant header data) is overwritten with /dev/random output / 0xFF-bytes. All of the CRC32s were updated for this of course. Note that this refers to the regular save file: Tri Force Heroes can be exploited via BOSS extdata - see above.
- Pokemon Mystery Dungeon: Gates to Infinity has the same unchecked file bounds as Pokemon Super Mystery Dungeon, however since save compression was introduced in Pokemon Super Mystery Dungeon, it only allocates one buffer within the application heap instead of several within the linear heap, resulting in nothing to corrupt or overwrite even if the file's length is extended past its allocation.
- "Kid Icarus: Uprising": Overwriting the entire savedata results in various crashes, nothing useful.
- Savedata/extdata for "Super Smash Bros 3DS": Overwriting the various files stored under savedata/extdata results in useless crashes.
- "StarFox 64 3D": Doesn't crash at all with the entire savedata overwritten.
- "Frogger 3D": Overwriting a savefile with random-data results in *nothing* crashing.
- "Mutant Mudds": Overwriting the savefile with random data results in a crash
- "Worcle Worlds": Overwriting the savefile with 0xFF results in a crash due to an out of bound read
- "Animal Crossing: New Leaf": Creating a QR code from random data results in a valid QR code and a random design. In some very rare cases(which aren't always reproducible?) a crash/etc may occur, but this isn't known to be useful.
- "Angry Birds Star Wars": Strings in the savefile are preceded by their lengths. These strings are never stored on the stack and are memcpy'd into heap memory. If the size is invalid the alloc will fail and thus the memcpy will operate on a nullptr resulting in a useless data abort.
- "Gem Smashers": Overwriting the savefile with random bytes results in useless crashes.
- "Luxor:" Strings/plaintext in the savefile are present and these's no checks. Overwriting the whole save (excluding the header), with /dev/random cause a useless crash.
- "Luv Me Buddies Wonderland:" Doesn't crash at all with the entire savedata overwritten. Overwriting some areas, points to useless nulls
Crashes needing investigation[edit]
- Disney Infinity crashes when all savedata overwritten with /dev/urandom. No checksums. 0xFF bytes don't cause a crash.
- Football Up Online / Soccer Up Online and Football Up 3D / Soccer Up 3D crash when teamname(UTF-16) length = 0x48 AND 0x20 null bytes are removed after just the name or if teamname length is way longer than 0x48.
System applications[edit]
Summary | Description | Fixed in version | Last version this flaw was checked for | Timeframe this was discovered | Discovered by |
---|---|---|---|---|---|
3DS System Settings DS profile string stack-smash | Too long or corrupted strings (01Ah 2 Nickname length in characters 050h 2 Message length in characters) in the NVRAM DS user settings (System Settings->Other Settings->Profile->Nintendo DS Profile) cause it to crash in 3DS-mode due to a stack-smash. The DSi is not vulnerable to this, DSi launcher(menu) and DSi System Settings will reset the NVRAM user-settings if the length field values are too long(same result as when the CRCs are invalid). TWL_FIRM also resets the NVRAM user-settings when the string-length(s) are too long. | 7.0.0-13 | 7.0.0-13 | 2012 | Ichfly |
3DS System Settings stack smash via title strings in DSiWare_Exports | DSiWare export banners contain 16 consecutive 0x100 byte, utf-16 game title strings for different languages. Nintendo correctly limits the string's max length by placing a NULL at str[127] before it's copied to the stack. However, they didn't allocate enough space for all 128 wchars (char/wchar type confusion?), so an attacker can craft a valid full-length string that will crash the stack at about str+0xEC. ROP execution can then be obtained from this crash in DSiWare Data Management as demonstrated here.
Interesting note: A line feed wchar (00 0A) at any point in the string before the crash offset will prevent the crash from occurring. |
11.17.0-50 | 11.13.0-45 | Dec. 2018 | Zoogie |
3DS SAFE_MODE System Updater stack smash from proxy-url string | During Recovery Mode and after all 3 wifi slots fail to find an access point for sysupdate, a user is permitted to access the wifi settings mode to make changes. Here, if the proxy-url field string's NULL terminator had been altered beforehand, a stack smash can occur when the user selects Proxy Settings -> Detailed Setup and the corrupted url string is displayed.
This is a difficult crash to control because the url string is converted from ascii to utf-16 between the slot and stack, effectively reducing the available gadgets to 0.4% of the normal amount. It's possible to improvise an "escape" using an eoreq pc w/shift gadget to combine registers and form a jump that can access 1/2 of all available gadgets. Because this exploit runs *under* SAFE_MODE, it's possible to run safehax with one's choice of k11 and arm9 hax. Prerequisite: a userland exploit with cfg:s/i access to modify the wifi slot. A demonstration can be viewed here. |
None | 11.13.0-45 | Jan. 2020 | Zoogie |
Nintendo 3DS Sound | When a .m4a is loaded, the song name is copied to a 256 byte buffer. When the song name begins with a Unicode BOM marker, it memcpy's the tag using the user-provided length. This gives an arbitrary write which can be used to achieve ROP. | 11.4.0-37 | 11.4.0-37 | June/July 2016 | nedwill |
EShop | When creating an audio decoder object for the moflex movie player, if the audio codec is PCM16, the application uses an uninitialized value as a pointer. One can spray the heap to get control of that pointer and achieve ROP. | None | 11.14.0-46 | 2020 | MrNbaYoh |
System applets[edit]
Summary | Description | Fixed in version | Last version this flaw was checked for | Introduced with version | Timeframe info related to this was added to wiki | Timeframe this was discovered | Discovered by |
---|---|---|---|---|---|---|---|
Webkit/web-browser bugs | spider has had at least three different code-execution exploits. Majority of them are use-after-free issues. See also here. | 2013? | A lot of people. | ||||
Old3DS/New3DS Browser-version-check bypass | When the browser-version-check code runs where the savedata for it was never initialized(such as when the user used the "Initialize savedata" option), it will use base_timestamp=0 instead of the timestamp loaded from savedata. This is then used with "if(cur_timestamp - base_timestamp >= <24h timestamp>){Run browser-version-check HTTPS request code}".
Hence, if the savedata was just initialized, and if the system datetime is set to before January 2, 2000, the browser-version-check will be skipped. This includes January 1, 2000, 00:00, because that's the epoch(timestamp value 0x0) used with this timestamp. See here for bypass usage instructions. |
10.7.0-32 | 9.9.0-26 | February 25, 2016 | November 2, 2015 (Exactly one week after the browser version pages were initially updated server-side) | Yellows8 | |
Skater - Bookmark OOB write | Each bookmark has an id that should not exceed 0x63 (99), however ids are not checked, this results in an OOB write on the stack, but only the value 0x01 can be written. | 11.6.0-39 | May 21, 2018 | May 20, 2018 | MrNbaYoh | ||
MicroSD Management - malformed security blob causes stack buffer overflow (mhax) | The MicroSD Management application's parsing of Windows NTLM security blobs in the SMB/CIFS protocol doesn't verify that the client's specified NT domain name is less than 32 UTF-16 characters. When it's longer, a stack buffer overrun occurs, leading to a ROP chain and complete control of the mcopy application.
The malformed security blob can be sent by an attacker within the SMB_COM_SESSION_SETUP_ANDX (0x73) packet. |
11.8.0-41 | 11.8.0-41 | 9.0.0-20 | August 12, 2018 | 2018 | smea |
Home Menu[edit]
Summary | Description | Fixed in version | Last version this flaw was checked for | Introduced with version | Timeframe info related to this was added to wiki | Timeframe this was discovered | Discovered by |
---|---|---|---|---|---|---|---|
u8 brightness setting OOB index (menuhax67) | Config block 0x50001, which contains a u8 brightness setting that indexes a table of u32 addresses, can be set to an out-of-bounds index (it's normally 1-5). Located within cfg block 0x50009, there exists a single controllable u32 that's located within the u8's range. With these set properly, one can eventually redirect a function pointer to an address of their choice. This is triggered after the Home Menu quick launch tab is activated. POC here. | None | 11.13.0-45 | October 4, 2020 | September, 2020 | Zoogie | |
bossbannerhax | After successfully loading extended-banner data(done when selecting an icon), Home Menu attempts to load "CBMD" data into a 0x100000-byte heap buffer from the stored SpotPass content. When successful and the magic-number is CBMD, Home Menu then decompresses the exbanner sections into another fixed-size heap buffer, without checking the outsize at all. The main CBMD CGFX code with ExeFS checks the size, but this code doesn't(however this is exbanner "CBMD", not a "normal" CBMD).
Used with menuhax as of v3.2. |
11.3.0-X | 1.0.0-0 | November 18, 2016 | December 23, 2014 | Yellows8 | |
sdiconhax | This is basically the same as nandiconhax, the vulnerable SD/NAND functions are identical minus the file-buffer offsets. Exploitation is different due to different heap-buffer location though. Unlike nandiconhax, the icon buffer for SD is located in linearmem(with recent Home Menu versions at least). This is used by menuhax. | 11.1.0-X | 4.0.0-X | July 27, 2016 | October 23, 2015 | Yellows8 | |
NAND-savedata Launcher.dat icons (nandiconhax) | The homemenu code processing the titleid list @ launcherdat+8 copies those titleIDs to another buffer, where the offset relative to that buffer is calculated using the corresponding s8/s16 entries. Those two values are not range checked at all. Hence, one can use this to write u64(s) with arbitrary values to before/after this allocated output buffer. See here regarding Launcher.dat structure.
This can be exploited(with Launcher.dat loading at startup at least) by using a s16 for the icon entry with value 0xFFEC(-20)(and perhaps more icons with similar s16 values to write multiple u64s). The result is that the u64 value is written to outbuf-0xA0, which overwrites object+0(vtable) and object+4(doesn't matter here) for an object that gets used a bit after the vulnerable function triggers. The low 32bits of the u64 can then be set to the address of controlled memory(either outbuf in regular heap or the entire launcherdat buffer in linearmem), for use as a fake vtable in order to get control of PC. From there one can begin ROP via vtable funcptrs to do a stack-pivot(r4=objectaddr at the time the above object gets used). Originally this vuln could only be triggered via Launcher.dat at Home Menu startup, right after Launcher.dat gets loaded + memory gets allocated, once the file-format version code is finished running. Starting with v9.6 this can be triggered when loading layouts from SD extdata as well. The vuln itself triggers before the layout data is written to Launcher.dat, but it doesn't seem to be possible to overwrite anything which actually gets used before the function which writes Launcher.dat into the layout gets called. Home Menu has some sort of fail-safe system(or at least on v9.7) when Home Menu crashes due to Launcher.dat(this also applies for other things with Home Menu): after crashing once, Home Menu resets Launcher.dat to a state where it no longer crashes anymore. However, note that any exploits using this which hang/etc without crashing will still brick the system. Hence, attempting anything with this on physnand without hw-nand-access isn't really recommended. |
11.1.0-X | 4.0.0-X | May 14, 2015 | Yellows8 | ||
Theme-data decompression buffer overflow (themehax) | The only func-call size parameter used by the theme decompression function is one for the compressed size, none for the decompressed size. The decompressed-size value from the LZ header is used by this function to check when to stop decompressing, but this function itself has nothing to verify the decompressed_size with. The code calling this function does not check or even use the decompressed size from the header either.
This function is separate from the rest of the Home Menu code: the function used for decompressing themes is *only* used for decompressing themes, nothing else. There's a separate decompression function in Home Menu used for decompressing everything else. That other decompression function in Home Menu handles decompression size properly(decompressed size check for max buffer size is done by code calling the other function, not in the function itself). Unlike the other function, the theme function supports multiple LZ algorithms, but the one which actually gets used in official themes is the same one supported by the other function anyway. See also here. With 10.2.0-X Home Menu, the only code change was that the following was added right after theme-load and before actual decompression: "if(<get_lzheader_decompressed_size>(compressed_buf) > 0x150000)<exit>;". This fixed the vuln. |
10.2.0-X | 10.2.0-X | <Old3DS/New3DS version which added initial theme support> | December 22, 2014 | Yellows8, Myria independently (~spring 2015) | |
Shuffle body-data buffer overflow (shufflehax) | See here. | 10.6.0-X | 10.6.0-X | 9.3.0-X | January 3, 2015 | Yellows8 | |
Extdata file-data loading buffer overflow | The extdata file-reading code allocates a fixed-size heap buffer for the expected filesize, then reads the filedata into this buffer using the actual FS filesize. Before v5.0 the filesize used here wasn't validated, hence if the filesize is larger than alloc_size a buffer overflow would occur. After doing the file-read it does validate that the actual_readsize matches the alloc_size, but at this point the buffer overflow has already occurred.
This affected at least the following: SaveData.dat and Cache.dat. This can be triggered with SaveData.dat by installing a <v4.0 Home Menu version, with Home Menu extdata from >=v4.0 still on SD. When this is done with v2.0 Home Menu, a kernelpanic occurs when processing an AM command(it appears a buffer ptr which is then passed to a command was overwritten with 0x0 - of course other SaveData.dat filesizes may result in different behaviour). |
5.0.0-X | 2.0.0-X | June 9, 2016 | June 9, 2016 | Yellows8 |
The icon data arrays used with {sd/nand}iconhax were added to SaveData.dat/Launcher.dat with 4.0.0-X, hence the vulnerable functions were added with that same version.
With <=v4.0 the SaveData.dat buffer is located in the regular heap. It's unknown when exactly it was moved to linearmem, which is where it's located with recent versions. It's located in linearmem for KOR >=v9.6 for example.
The SaveData.dat/Launcher.dat icon vulns were fixed by doing various unsigned >=60/>=360 checks on the loaded values. When these checks fail, it just skips over handling this icon entry. Hence, the original value can't be negative / out-of-bounds any more.
Useless crashes[edit]
Old3DS system web-browser:
- 2^32 characters long string(finally fixed with v10.6): this is similar to the vulnerability fixed here, concat-large-strings-crash2.html triggers a crash which is about the same as the one triggered by a 2^32 string. Most of the time this vulnerability will cause a memory page permissions fault, since the WebKit code attempts to copy the string text data to the output buffer located in read-only CRO heap memory. The only difference between a crash triggered by a 2^32 string and the concat-large-strings-crash2.html crash is at the former copies the string data using the original string length(like 1 text character for "x", 4 for "xxxx") while the latter attempts to copy >12MB. In some very rare cases a thread separate from the string data-copy thread will crash, this might be exploitable. However, this is mostly useless since it rarely crashes this way.
- Trying to directly load a page via the browser "URL" option with webkitdebug setup, causes a crash to trigger in oss.cro due to an use-after-free being caught with webkitdebug. This is presumably some sort of realloc() issue in the libcurl version used by the <={v10.2-v10.3} browser. This happens with *every* *single* *page* one tries to load via the "URL" option, but not when loading links on the current page, hence this is probably useless. A different use-after-free with realloc triggers with loading any page at all regardless of method too(libcurl probably).
- This WebKit build has a lot of crash-trigger bugs that only happen with webkitdebug completely setup(addr accesses near 0x0), with just trying to load any page at all.