Sony's PlayStation Portable handheld console could be infected by malicious code using a buffer overflow vulnerability, according to a warning from an antivirus company.
UK-based Panda Software said that proof-of-concept code already exists that exploits this flaw and works on all versions of PSP firmware that can view TIFF files.
"The vulnerability is particularly dangerous as it could be exploited through malicious code programmed for this purpose or even directly by hackers," said Luis Corrons, director of PandaLabs.
Last year, PandaLabs detected the Format.A and Tahen Trojans that were designed to target the PSP and could delete files and even render the console unusable.
"It is highly recommended not to install software on consoles that does not come from reliable sources, and before doing so it is advisable to scan it first with an updated antivirus solution," said Corrons.
"Similarly, external communication by USB, IrDA or Wi-Fi should not be established with untrustworthy consoles or computers that could transfer unwanted information."
Hacker threat to Sony PlayStation Portable
By
Matt Chapman
on
Sep 12, 2006 4:14PM

Sony's PlayStation Portable handheld console could be infected by malicious code using a buffer overflow vulnerability, according to a warning from an antivirus company.
Got a news tip for our journalists? Share it with us anonymously here.
Sponsored Whitepapers
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future

Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection