Jump to content


PS4 6.70 - 6.72 Kernel Exploit 1.0.0

¿Quieres enterarte al momento de las nuevas descargas? Síguenos en Twitter, Mastodon o Threads!

In this project you will find a full implementation of the "ipv6 uaf" kernel exploit for the PlayStation 4 on 6.70 - 6.72. It will allow you to run arbitrary code as kernel, to allow jailbreaking and kernel-level modifications to the system. will launch the usual payload launcher (on port 9020).

This bug was originally discovered by Fire30, and subsequently found by Andy Nguyen.

in-ps4-ps4-ipv6-uaf-670-672-le-nouvel-exploit-672-de-chendochap-1.jpg

Patches Included

The following patches are applied to the kernel:

  1. Allow RWX (read-write-execute) memory mapping (mmap / mprotect)
  2. Syscall instruction allowed anywhere
  3. Dynamic Resolving (sys_dynlib_dlsym) allowed from any process
  4. Custom system call #11 (kexec()) to execute arbitrary code in kernel mode
  5. Allow unprivileged users to call setuid(0) successfully. Works as a status check, doubles as a privilege escalation.

Notes

The page will crash on successful kernel exploitation, this is normal

There are a few races involved with this exploit, losing one of them and attempting the exploit again might not immediately crash the system but stability will take a hit.

Contributors

  • Specter - advice + 5.05 webkit and (6.20) rop execution method
  • kiwidog - advice
  • Fire30 - bad_hoist
  • Andy Nguyen - disclosed exploit code
  • SocraticBliss - Shakespeare dev & crash test dummy

by ChendoChap.


No te pierdas nada, síguenos en Twitter, Mastodon o Threads!
Preguntas, aportes y peticiones en el foro.

×
×
  • Crear nuevo...