I have stuck. Must be a lack of experience on exploiting things.
Most important question: what kind of code can be used to understand when
this code is actually executed? There is no point on wasting time searching
exploit entry address, unless you shure you'll notice the hit. I were
thinkin of some kind of dead loop, but my iPod freezed few times just at
overflow, so its probably not the best way.
And what kind of data one must corrupt to completely freeze iPod?

The overflow I'm tryin to exploit is at A tag: [a href="here"]; iPod goes
reboot when target file name is longer than 266 bytes. And Notes does handle
such names with out any problems, so I think its goes out of bounds
somewhere at file existance check (inside interrupt handler?).
Notes apply some restrictions to exploit code: it turns bytes with value>127
to two-byte (UTF?) sequences and, probably, converts lowercase latin
chars(0x61-0x7A) to uppercase. This makes unusable some conditional codes
(including ALWAYS), branches to negative offset, few ALU instructions, and
some other, less useful things. Still I think there is enough freedom to
code something interesting, and its always possible to generate necessary
instructions in-place.
_______________________________________________
Linux4nano-dev mailing list
[email protected]
https://mail.gna.org/listinfo/linux4nano-dev
http://www.linux4nano.org

Reply via email to