CTurt annonce sur Twitter qu'il a trouvé un exploit kernel sur PS4.
MISE A JOUR: Cturt nous tease un peu avec un listing des fichiers et dossiers à la racine du système de fichiers :
[+] Entered shellcode
[+] UID: 0, GID: 0
[DIR]: .
[DIR]: ..
[DIR]: adm
[DIR]: app_tmp
[DIR]: data
[DIR]: dev
[DIR]: eap_user
[DIR]: eap_vsh
[DIR]: hdd
[DIR]: host
[DIR]: hostapp
[FILE]: mini-syscore.elf
[DIR]: mnt
[DIR]: preinst
[DIR]: preinst2
[FILE]: safemode.elf
[FILE]: SceBootSplash.elf
[FILE]: SceSysAvControl.elf
[DIR]: system
[DIR]: system_data
[DIR]: system_ex
[DIR]: system_tmp
[DIR]: update
[DIR]: usb
[DIR]: user
Ainsi que la liste des processus en cours d'exécution ainsi que leur PID :
[+] PID 0, name: kernel, thread: mca taskq
[+] PID 1, name: mini-syscore.elf, thread: SceRegSyncer
[+] PID 2, name: SceHidAuth, thread: SceHidAuth
[+] PID 3, name: hidMain, thread: hidMain
[+] PID 4, name: SceCameraDriverMain, thread: SceCameraDriverM
[+] PID 5, name: SceCameraSdma, thread: SceCameraSdma
[+] PID 6, name: hdmiEvent, thread: hdmiEvent
[+] PID 8, name: xpt_thrd, thread: xpt_thrd
[+] PID 9, name: iccnvs, thread: iccnvs
[+] PID 10, name: audit, thread: audit
[+] PID 11, name: idle, thread: idle: cpu0
[+] PID 12, name: intr, thread: irq273: xhci2
[+] PID 13, name: geom, thread: g_notification
[+] PID 14, name: yarrow, thread: yarrow
[+] PID 15, name: usb, thread: usbus2
[+] PID 16, name: md0, thread: md0
[+] PID 17, name: icc_thermal, thread: icc_thermal
[+] PID 18, name: sflash, thread: sflash
[+] PID 19, name: sbram, thread: sbram
[+] PID 20, name: trsw intr, thread: trsw intr
[+] PID 21, name: trsw ctrl, thread: trsw ctrl
[+] PID 22, name: SceBtDriver, thread: SceBtDriver
[+] PID 23, name: pagedaemon0, thread: pagedaemon0
[+] PID 24, name: pagedaemon1, thread: pagedaemon1
[+] PID 25, name: vmdaemon, thread: vmdaemon
[+] PID 26, name: bufdaemon, thread: bufdaemon
[+] PID 27, name: syncer, thread: syncer
[+] PID 28, name: vnlru, thread: vnlru
[+] PID 29, name: softdepflush, thread: softdepflush
[+] PID 31, name: SceSysAvControl.elf, thread: SceAvSettingPoll
[+] PID 33, name: SceSysCore.elf, thread: SysCoreAppmgrWat
[+] PID 34, name: orbis_audiod.elf, thread: AoutMonitorPid40
[+] PID 35, name: GnmCompositor.elf, thread: CameraThread
[+] PID 36, name: SceShellCore, thread: SceMsgMwSendMana
[+] PID 38, name: SceShellUI, thread: SceWebReceiveQue
[+] PID 39, name: MonoCompiler.elf, thread: MonoCompiler.elf
[+] PID 40, name: SceAvCapture, thread: SceAvCaptureIpc
[+] PID 41, name: SceGameLiveStreamin, thread: SceGlsStrmJobQue
[+] PID 42, name: ScePartyDaemon, thread: SceMbusEventPoll
[+] PID 43, name: SceVideoCoreServer, thread: SceVideoCoreServ
[+] PID 44, name: SceRemotePlay, thread: SceRp-Httpd
[+] PID 45, name: SceCloudClientDaemo, thread: SceCloudClientDa
[+] PID 46, name: SceVdecProxy.elf, thread: proxy_ipmi_serve
[+] PID 47, name: SceVencProxy.elf, thread: SceVencProxyIpmi
[+] PID 48, name: fs_cleaner.elf, thread: fs_cleaner.elf
[+] PID 49, name: SceSpkService, thread: SceSpkService
[+] PID 50, name: WebProcess.self, thread: selectThread
[+] PID 51, name: orbis-jsc-compiler., thread: SceFastMalloc
[+] Triggering second kernel payload
[+] Entered main payload
Un exploit kernel signifie probablement un accès quasiment complet à la console. On ne sait pas si ça implique aussi la lecture de jeux sous forme de copie de sauvegarde, en tout cas on peut fortement espérer que ça implique être en firmware compatible avec l'exploit user mode de la console dévoilé il y a plus d'un an.
On n'en sait pas grand chose, restez à l'affut pour plus d'infos !
Source : https://twitter.com/CTurtE/status/673581693207502849
2 comments
mise a jour
Soumis par pandemoniume le mar, 08/12/2015 - 12:02merci pour la news
question peut on mettre a jour avec une clé usb ? comment mettre a jour?
sur ton autre news le lien sur le firmware 1.76 est dead a tu un autre lien
merci ;)
oui tu peux mettre à jour,
Soumis par Attila le lun, 14/12/2015 - 20:50oui tu peux mettre à jour, mais bien sur seulement si t'es en firmware en dessous de 1.76
j'ai mit à jour le fichier du firmware ici :
http://www.ps4-info.fr/tutoriel/mises-jour-ps4-et-ps4updatepup