Bug found in Playstation 3

Status
Not open for further replies.

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Forum Veteran
Jan 24, 2011
9,380
1
24,874
8,379
malwaretips.com
Info Security said:
If you haven't already upgraded your Playstation 3 firmware from 4.31 to the 4.41 version released at the end of last month, now might be a good time to do so - it fixes a bug found by Vulnerability Lab six months ago.

The bug is difficult to exploit, and is consequently described as 'potentially' worrying. It typically requires the target to load a doctored 'saved game' from a USB stick. "The PS3 filter system of the SpeicherDaten (DienstProgramm) module does not recognize special characters and does not provide any kind of input restrictions," reported Vulnerability Lab. "Attackers can manipulate the .sfo file of a save game to execute system specific commands or inject malicious persistent script code."

If successful, it warned, it "can result in persistent but local system command executions, PSN session hijacking, persistent phishing attacks, external redirect out of the vulnerable module, stable persistent save game preview listing context manipulation."

But Christopher Boyd, a researcher and games specialist with GFI Software, doesn't think PS3 gamers need worry too much. He told The Register that a successful attack would require multiple steps, each of which could cause alarm. First the attacker would need to 'resign' malicious saves and store them on a free file host (red flag 1); or post to a dedicated gaming site "which can smell a rogue a mile away" (red flag 2). Alternatively, he would need local access to the PS3 (red flag 3) in order to get a game save on USB loaded.

"One might ask,” said Boyd, "why doing all of the above to phish somebody (for example) is worth it when simply sending an in-game phish link would be simpler."

Read more: http://www.infosecurity-magazine.com/view/32692/bug-found-in-playstation-3/
 
Status
Not open for further replies.