2018-05-08 15:48:58 -07:00
# Fusée Gelée
2018-04-23 09:11:57 -06:00
2018-05-08 15:48:58 -07:00
```
2018-04-23 09:11:57 -06:00
* .--.
/ / `
+ | |
' \ \__,
* + '--' *
+ /\
+ .' '. *
* /======\ +
;:. _ ;
|:. (_) |
|:. _ |
+ |:. (_) | *
;:. ;
.' \:. / `.
/ .-'':._.'`-. \
|/ /||\ \|
_..--"""````"""--.._
_.-'`` ``'-._
2018-07-13 22:47:38 -06:00
__ __ _ __
/ _| /_ / | | /_/
| |_ _ _ ___ ___ ___ __ _ ___| | ___ ___
| _| | | / __ |/ _ \/ _ \ / _` |/ _ \ |/ _ \/ _ \
| | | |_| \__ \ __ / __ / | (_| | __ / | __ / __ /
|_| \__,_|___/\___|\___| \__, |\___|_|\___|\___|
__ / |
|___/
2018-05-08 15:48:58 -07:00
```
## Fusée Launcher
The Fusée Launcher is a proof-of-concept arbitrary code loader for a variety
of Tegra processors, which takes advantage of CVE-2018-6242 ("Fusée Gelée")
to gain arbitrary code execution and load small payloads over USB.
The vulnerability is documented in the 'report' subfolder; more details and
guides are to follow! Stay tuned...
### Use Instructions
2018-05-23 13:57:42 +03:00
The main launcher is "fusee-launcher.py". Windows, Linux, macOS and FreeBSD are all natively supported! Instructions for Windows specifically can be found on the [wiki ](https://github.com/reswitched/fusee-launcher/wiki/Instructions-(Windows )).
2018-05-09 12:51:46 -04:00
With a Tegra device in RCM and connected via USB, invoke the launcher with the desired payload as an argument, e.g. `./fusee-launcher.py payload.bin` . Linux systems currently require either that the Tegra device be connected to an XHCI controller (used with blue USB 3 ports) or that the user has patched their EHCI driver.
2018-05-08 15:48:58 -07:00
2018-05-08 15:49:29 -07:00
### Credits
2018-05-08 15:48:58 -07:00
Fusée Gelée (CVE-2018-6242) was discovered and implemented by Kate Temkin (@ktemkin );
its launcher is developed and maintained by Mikaela Szekely (@Qyriad ) and Kate Temkin (@ktemkin ).
Credit goes to:
2018-05-08 15:50:51 -07:00
* Qyriad -- maintainership and expansion of the code
* SciresM, motezazer -- guidance and support
* hedgeberg, andeor -- dumping the Jetson bootROM
* TuxSH -- help with a first pass of bootROM RE
* the ReSwitched team
2018-05-08 15:48:58 -07:00
Love / greetings to:
2018-05-08 15:50:51 -07:00
* Levi / lasersquid
* Aurora Wright
* f916253
* MassExplosion213
CVE-2018-6242 was also independently discovered by fail0verflow member
shuffle2 as the "shofEL2" vulnerability-- so that's awesome, too.