Sony's PlayStation Portable handheld console could be infected by malicious code using a buffer overflow vulnerability, according to a warning from an antivirus company.
UK-based Panda Software said that proof-of-concept code already exists that exploits this flaw and works on all versions of PSP firmware that can view TIFF files.
"The vulnerability is particularly dangerous as it could be exploited through malicious code programmed for this purpose or even directly by hackers," said Luis Corrons, director of PandaLabs.
Last year, PandaLabs detected the Format.A and Tahen Trojans that were designed to target the PSP and could delete files and even render the console unusable.
"It is highly recommended not to install software on consoles that does not come from reliable sources, and before doing so it is advisable to scan it first with an updated antivirus solution," said Corrons.
"Similarly, external communication by USB, IrDA or Wi-Fi should not be established with untrustworthy consoles or computers that could transfer unwanted information."
Hacker threat to Sony PlayStation Portable
By
Matt Chapman
on Sep 12, 2006 9:45AM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content
Ingram Micro Ushers in the Age of Ultra

Kaseya Dattocon APAC 2024 is Back

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers

Build cybersecurity capability with award winning Fortinet training from Ingram Micro

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program
Sponsored Whitepapers

Easing the burden of Microsoft CSP management
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management